Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL_119040 receipt document,pdf.exe

Overview

General Information

Sample Name:DHL_119040 receipt document,pdf.exe
Analysis ID:672294
MD5:5a975876a6183035d674a69990752a0a
SHA1:466d5c51e510dce79adfe9667ac34b057c6a77a3
SHA256:97ed8b1eda57edbbc3c2d12faeeec7f3091392ee8c42dd516ac789f18ffacc42
Tags:AgentTeslaDHLexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Snort IDS alert for network traffic
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
.NET source code references suspicious native API functions
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Executable has a suspicious name (potential lure to open the executable)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Uses SMTP (mail sending)
Creates a window with clipboard capturing capabilities
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • DHL_119040 receipt document,pdf.exe (PID: 7080 cmdline: "C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe" MD5: 5A975876A6183035D674A69990752A0A)
    • cvtres.exe (PID: 7116 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe MD5: C09985AE74F0882F208D75DE27770DFA)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "facturare@rematinvest.ro", "Password": "RyN!2020-", "Host": "mail.rematinvest.ro"}
SourceRuleDescriptionAuthorStrings
00000001.00000000.450414167.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000000.450414167.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000001.00000000.449260040.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000000.449260040.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000001.00000000.450990827.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            1.0.cvtres.exe.400000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.0.cvtres.exe.400000.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                1.0.cvtres.exe.400000.3.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x3279d:$s10: logins
                • 0x32204:$s11: credential
                • 0x2e7da:$g1: get_Clipboard
                • 0x2e7e8:$g2: get_Keyboard
                • 0x2e7f5:$g3: get_Password
                • 0x2fad6:$g4: get_CtrlKeyDown
                • 0x2fae6:$g5: get_ShiftKeyDown
                • 0x2faf7:$g6: get_AltKeyDown
                0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 19 entries
                    No Sigma rule has matched
                    Timestamp:192.168.2.5109.99.162.14497675872840032 07/23/22-18:24:15.530948
                    SID:2840032
                    Source Port:49767
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.5109.99.162.14497675872851779 07/23/22-18:24:15.530948
                    SID:2851779
                    Source Port:49767
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:192.168.2.5109.99.162.14497675872030171 07/23/22-18:24:15.530849
                    SID:2030171
                    Source Port:49767
                    Destination Port:587
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: DHL_119040 receipt document,pdf.exeVirustotal: Detection: 31%Perma Link
                    Source: DHL_119040 receipt document,pdf.exeReversingLabs: Detection: 65%
                    Source: DHL_119040 receipt document,pdf.exeJoe Sandbox ML: detected
                    Source: 1.0.cvtres.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.2.cvtres.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.cvtres.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "facturare@rematinvest.ro", "Password": "RyN!2020-", "Host": "mail.rematinvest.ro"}
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: NBCBNCXHJKDJHD23442.pdb source: DHL_119040 receipt document,pdf.exe
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_01766780
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_0176C964
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_0176D42D
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_0176D7FC
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_017667A4
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_0176678C
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_0176CA0A

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.5:49767 -> 109.99.162.14:587
                    Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.5:49767 -> 109.99.162.14:587
                    Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49767 -> 109.99.162.14:587
                    Source: Joe Sandbox ViewASN Name: RTDBucharestRomaniaRO RTDBucharestRomaniaRO
                    Source: global trafficTCP traffic: 192.168.2.5:49767 -> 109.99.162.14:587
                    Source: global trafficTCP traffic: 192.168.2.5:49767 -> 109.99.162.14:587
                    Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cDJlhu.com
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                    Source: cvtres.exe, 00000001.00000002.713759717.0000000006BF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.rematinvest.ro
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://ocsp.digicert.com0C
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://ocsp.digicert.com0O
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                    Source: cvtres.exe, 00000001.00000002.713759717.0000000006BF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://rematinvest.ro
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: http://www.digicert.com/CPS0
                    Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                    Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: https://www.digicert.com/CPS0
                    Source: DHL_119040 receipt document,pdf.exeString found in binary or memory: https://www.globalsign.com/repository/0
                    Source: cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownDNS traffic detected: queries for: mail.rematinvest.ro

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: DHL_119040 receipt document,pdf.exe
                    Source: initial sampleStatic PE information: Filename: DHL_119040 receipt document,pdf.exe
                    Source: 1.0.cvtres.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.csLarge array initialization: .cctor: array initializer size 11646
                    Source: 1.0.cvtres.exe.400000.3.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.csLarge array initialization: .cctor: array initializer size 11646
                    Source: 1.2.cvtres.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.csLarge array initialization: .cctor: array initializer size 11646
                    Source: 1.0.cvtres.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.csLarge array initialization: .cctor: array initializer size 11646
                    Source: 1.0.cvtres.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.csLarge array initialization: .cctor: array initializer size 11646
                    Source: 1.0.cvtres.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b277910BDu002dFED8u002d4704u002dB713u002d4917BF11BC4Cu007d/u003015E90E4u002d6658u002d4665u002d9F31u002d0FF2B031367D.csLarge array initialization: .cctor: array initializer size 11646
                    Source: DHL_119040 receipt document,pdf.exeStatic file information: Suspicious name
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017689980_2_01768998
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017625800_2_01762580
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01769CE00_2_01769CE0
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01766B480_2_01766B48
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01761B480_2_01761B48
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176BF180_2_0176BF18
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176DB180_2_0176DB18
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017612B00_2_017612B0
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017625700_2_01762570
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017675500_2_01767550
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176A1480_2_0176A148
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176C5210_2_0176C521
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176A12C0_2_0176A12C
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176A11E0_2_0176A11E
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176350D0_2_0176350D
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017689890_2_01768989
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017634400_2_01763440
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017678400_2_01767840
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017604480_2_01760448
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017678290_2_01767829
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017688180_2_01768818
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176040F0_2_0176040F
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176A0E80_2_0176A0E8
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01769CD00_2_01769CD0
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017633500_2_01763350
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01761B380_2_01761B38
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01766B390_2_01766B39
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176BF080_2_0176BF08
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176DB080_2_0176DB08
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01766FE80_2_01766FE8
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01766FD80_2_01766FD8
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017612240_2_01761224
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017656200_2_01765620
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_017656100_2_01765610
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_04DEF0801_2_04DEF080
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_04DEF3C81_2_04DEF3C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_04DE61201_2_04DE6120
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_095700401_2_09570040
                    Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.455149585.00000000032D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHVABjdWatjolCFUDdeTjpFHzNrt.exe4 vs DHL_119040 receipt document,pdf.exe
                    Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.452824150.0000000000F3D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNBCBNCXHJKDJHD23442.exeH vs DHL_119040 receipt document,pdf.exe
                    Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHVABjdWatjolCFUDdeTjpFHzNrt.exe4 vs DHL_119040 receipt document,pdf.exe
                    Source: DHL_119040 receipt document,pdf.exeBinary or memory string: OriginalFilenameNBCBNCXHJKDJHD23442.exeH vs DHL_119040 receipt document,pdf.exe
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: invalid certificate
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: DHL_119040 receipt document,pdf.exeVirustotal: Detection: 31%
                    Source: DHL_119040 receipt document,pdf.exeReversingLabs: Detection: 65%
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe "C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe"
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DHL_119040 receipt document,pdf.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                    Source: DHL_119040 receipt document,pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01761224 FindResourceA,0_2_01761224
                    Source: 1.0.cvtres.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.0.cvtres.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.0.cvtres.exe.400000.3.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.0.cvtres.exe.400000.3.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.2.cvtres.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 1.2.cvtres.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: NBCBNCXHJKDJHD23442.pdb source: DHL_119040 receipt document,pdf.exe
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_00EF6765 push cs; ret 0_2_00EF6766
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_01767DC0 push esp; iretd 0_2_01767DC2
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176A891 push cs; ret 0_2_0176A892
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 1_2_0957A002 push 8B000005h; retf 1_2_0957A007
                    Source: DHL_119040 receipt document,pdf.exeStatic PE information: real checksum: 0x59dd1 should be: 0x5d373
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.674710257857661
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe TID: 7100Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 4384Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 3548Thread sleep count: 9516 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow / User API: threadDelayed 9516Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.455840866.0000000004AC5000.00000004.00000800.00020000.00000000.sdmp, DHL_119040 receipt document,pdf.exe, 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %GiEQgaEQeMUQ
                    Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %kWjFEAAAGiEQgaEQeMUQAAAaIRC
                    Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %/gEsBhYqHwoTCwARCx3+ASwHCBYzGh4TCwARCxv+ASwGFhMEHBMLABELHwr+ASwgEQQNAgd0DAAAGxEECBZvuQEAChMGEQYWM1cWKh8LEwsAEQse/gEsFQIgAAAAgCj0AgAGKOoAAAYmHwkTCwARCxj+ASwGAxRRGRMLABELF/4BLAMYEwsAEQsW/gEsAxcTCwARCx8L/gEsAisFOCX///8RBBEG1hMECBEG2gwHdAwAABsWCRnaKLoBAAoRBBIAKM8AAAY5SP///wMoowAACgd0DAAAGxYGb9YAAApREQQGOxQBAAARBAbaEwcEEQcX2hfWjS8AAAFRFNCCAAABKBQAAAooVQIABhuNBwAAARMIEQgWBygRAAAKohEIFwaMUQAAAaIRCBgEUKIRCBkWjFEAAAGiEQgaEQeMUQAAAaIRCBM
                    Source: cvtres.exe, 00000001.00000002.715207118.000000000A020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeCode function: 0_2_0176D630 CheckRemoteDebuggerPresent,0_2_0176D630
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 436000Jump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 438000Jump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 8C5008Jump to behavior
                    Source: DHL_119040 receipt document,pdf.exe, u206a????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'GetProcAddress@kernel32'), ('?????????????????????????????????????????', 'LoadLibraryA@kernel32')
                    Source: DHL_119040 receipt document,pdf.exe, u200f????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'OpenProcess@kernel32.dll'), ('?????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll')
                    Source: 0.0.DHL_119040 receipt document,pdf.exe.ef0000.0.unpack, u206a????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'GetProcAddress@kernel32'), ('?????????????????????????????????????????', 'LoadLibraryA@kernel32')
                    Source: 0.0.DHL_119040 receipt document,pdf.exe.ef0000.0.unpack, u200f????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'OpenProcess@kernel32.dll'), ('?????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll')
                    Source: 0.2.DHL_119040 receipt document,pdf.exe.ef0000.0.unpack, u206a????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'GetProcAddress@kernel32'), ('?????????????????????????????????????????', 'LoadLibraryA@kernel32')
                    Source: 0.2.DHL_119040 receipt document,pdf.exe.ef0000.0.unpack, u200f????????????????????????????????????????.csReference to suspicious API methods: ('?????????????????????????????????????????', 'OpenProcess@kernel32.dll'), ('?????????????????????????????????????????', 'LoadLibrary@kernel32.dll'), ('?????????????????????????????????????????', 'GetProcAddress@kernel32.dll')
                    Source: 1.0.cvtres.exe.400000.0.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.0.cvtres.exe.400000.3.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.2.cvtres.exe.400000.0.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.0.cvtres.exe.400000.4.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.0.cvtres.exe.400000.2.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: 1.0.cvtres.exe.400000.1.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeJump to behavior
                    Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.455149585.00000000032D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                    Source: DHL_119040 receipt document,pdf.exe, 00000000.00000002.455149585.00000000032D2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Progman
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeQueries volume information: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.450414167.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.449260040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.450990827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.709452659.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.449737218.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.712487104.0000000006B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL_119040 receipt document,pdf.exe PID: 7080, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 7116, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: Yara matchFile source: 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 7116, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL_119040 receipt document,pdf.exe.51862c0.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.450414167.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.449260040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.450990827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.709452659.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.449737218.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.712487104.0000000006B6A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL_119040 receipt document,pdf.exe PID: 7080, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 7116, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception312
                    Process Injection
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    221
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default Accounts1
                    Native API
                    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    11
                    Input Capture
                    2
                    Process Discovery
                    Remote Desktop Protocol11
                    Input Capture
                    Exfiltration Over Bluetooth1
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)141
                    Virtualization/Sandbox Evasion
                    Security Account Manager141
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)312
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model1
                    Data from Local System
                    Scheduled Transfer11
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Remote System Discovery
                    SSH1
                    Clipboard Data
                    Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common3
                    Obfuscated Files or Information
                    Cached Domain Credentials114
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    DHL_119040 receipt document,pdf.exe31%VirustotalBrowse
                    DHL_119040 receipt document,pdf.exe65%ReversingLabsByteCode-MSIL.Spyware.Noon
                    DHL_119040 receipt document,pdf.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    1.0.cvtres.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.cvtres.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                    1.2.cvtres.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.cvtres.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.cvtres.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.cvtres.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                    SourceDetectionScannerLabelLink
                    rematinvest.ro0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://mail.rematinvest.ro0%Avira URL Cloudsafe
                    http://cDJlhu.com0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://rematinvest.ro0%Avira URL Cloudsafe
                    https://api.ipify.org%%startupfolder%0%URL Reputationsafe
                    https://api.ipify.org%0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    rematinvest.ro
                    109.99.162.14
                    truetrueunknown
                    mail.rematinvest.ro
                    unknown
                    unknownfalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://mail.rematinvest.rocvtres.exe, 00000001.00000002.713759717.0000000006BF8000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://cDJlhu.comcvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://127.0.0.1:HTTP/1.1cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://rematinvest.rocvtres.exe, 00000001.00000002.713759717.0000000006BF8000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.org%%startupfolder%cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      low
                      https://api.ipify.org%cvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      low
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwcvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://DynDns.comDynDNSnamejidpasswordPsi/Psicvtres.exe, 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      109.99.162.14
                      rematinvest.roRomania
                      9050RTDBucharestRomaniaROtrue
                      Joe Sandbox Version:35.0.0 Citrine
                      Analysis ID:672294
                      Start date and time: 23/07/202218:22:402022-07-23 18:22:40 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 9m 5s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:DHL_119040 receipt document,pdf.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:18
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:
                      • Successful, ratio: 10.5% (good quality ratio 6.6%)
                      • Quality average: 40.8%
                      • Quality standard deviation: 37.5%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 56
                      • Number of non-executed functions: 16
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Adjust boot time
                      • Enable AMSI
                      • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, WMIADAP.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                      • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, licensing.mp.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      18:24:01API Interceptor1x Sleep call for process: DHL_119040 receipt document,pdf.exe modified
                      18:24:06API Interceptor772x Sleep call for process: cvtres.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      109.99.162.14SecuriteInfo.com.W32.MSIL_Kryptik.HRZ.genEldorado.12789.exeGet hashmaliciousBrowse
                        SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeGet hashmaliciousBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          RTDBucharestRomaniaROx86_64-20220723-1318Get hashmaliciousBrowse
                          • 109.102.109.70
                          SecuriteInfo.com.W32.MSIL_Kryptik.HRZ.genEldorado.12789.exeGet hashmaliciousBrowse
                          • 109.99.162.14
                          SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeGet hashmaliciousBrowse
                          • 109.99.162.14
                          bMwvKA6Owe.exeGet hashmaliciousBrowse
                          • 109.102.255.230
                          kfHWoySTelGet hashmaliciousBrowse
                          • 109.99.173.28
                          home.mipsGet hashmaliciousBrowse
                          • 80.97.224.199
                          #Ud83d#Udd0a VM 9193408792.wav.htmlGet hashmaliciousBrowse
                          • 92.87.6.53
                          jTpjSXxHjt.dllGet hashmaliciousBrowse
                          • 92.81.66.155
                          oWmdf3W67o.dllGet hashmaliciousBrowse
                          • 109.103.48.81
                          djA1JX3UZv.dllGet hashmaliciousBrowse
                          • 92.83.238.161
                          342hs5UFG1.dllGet hashmaliciousBrowse
                          • 109.102.113.172
                          196608.htmGet hashmaliciousBrowse
                          • 92.87.6.53
                          fxyKXb2hV5.dllGet hashmaliciousBrowse
                          • 109.103.83.54
                          v8Rhp4teOl.dllGet hashmaliciousBrowse
                          • 92.85.58.229
                          7T2Y8w1zOi.dllGet hashmaliciousBrowse
                          • 92.83.239.195
                          E3mbtPKpoj.dllGet hashmaliciousBrowse
                          • 92.80.107.22
                          agsS7yP4eP.dllGet hashmaliciousBrowse
                          • 89.121.130.106
                          Vi3ioqKqPS.dllGet hashmaliciousBrowse
                          • 86.35.226.0
                          eYB6B0ahQe.dllGet hashmaliciousBrowse
                          • 92.81.231.56
                          196488.htmGet hashmaliciousBrowse
                          • 92.87.6.53
                          No context
                          No context
                          Process:C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):226
                          Entropy (8bit):5.3467126928258955
                          Encrypted:false
                          SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2LDY3U21v:Q3La/KDLI4MWuPk21v
                          MD5:DD8B7A943A5D834CEEAB90A6BBBF4781
                          SHA1:2BED8D47DF1C0FF76B40811E5F11298BD2D06389
                          SHA-256:E1D0A304B16BE51AE361E392A678D887AB0B76630B42A12D252EDC0484F0333B
                          SHA-512:24167174EA259CAF57F65B9B9B9C113DD944FC957DB444C2F66BC656EC2E6565EFE4B4354660A5BE85CE4847434B3BDD4F7E05A9E9D61F4CC99FF0284DAA1C87
                          Malicious:true
                          Reputation:moderate, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):6.828168762132371
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                          • Win32 Executable (generic) a (10002005/4) 49.97%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:DHL_119040 receipt document,pdf.exe
                          File size:352408
                          MD5:5a975876a6183035d674a69990752a0a
                          SHA1:466d5c51e510dce79adfe9667ac34b057c6a77a3
                          SHA256:97ed8b1eda57edbbc3c2d12faeeec7f3091392ee8c42dd516ac789f18ffacc42
                          SHA512:5713ae6663e43823b0e706b9da34ef6139d9ab62cd5144b4b62ac52a002e1408e917bbd7c7288986b480104df0b7ca6483471d43126ef7c59f4d8cf0334570fd
                          SSDEEP:6144:zz0M9JNH59m2/BHG2n1n4Ft9WiJIb82kvsxK32yr42rA:PxbH59m9s4FnJIb82kvs432yr4J
                          TLSH:F37439887D5032CFCC16C872CA787C64AAEC6C6657178203AC57355DAB3F58E8E375A2
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....\.b..............0.................. ........@.. ....................................`................................
                          Icon Hash:18d0c4ccccc4d800
                          Entrypoint:0x43a12e
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x62DA5CE6 [Fri Jul 22 08:16:38 2022 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Signature Valid:false
                          Signature Issuer:CN=GlobalSign CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE
                          Signature Validation Error:The digital signature of the object did not verify
                          Error Number:-2146869232
                          Not Before, Not After
                          • 8/25/2020 6:42:07 AM 8/26/2023 6:42:07 AM
                          Subject Chain
                          • CN=win.rar GmbH, O=win.rar GmbH, L=Berlin, S=Berlin, C=DE
                          Version:3
                          Thumbprint MD5:185DBD4A2E2671589EEB3E7E1920EA9F
                          Thumbprint SHA-1:B3DF816A17A25557316D181DDB9F46254D6D8CA0
                          Thumbprint SHA-256:66DB1C86D38273627C837F4638122FA88BBFFFF31C4052115B98CAF6CE0C631E
                          Serial:731D40AE3F3A1FB2BC3D8395
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3a0d40x57.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x19a76.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x522000x3e98
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x560000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x3a0880x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x381340x38200False0.8411443833518931data7.674710257857661IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0x3c0000x19a760x19c00False0.08731227245145631data3.132050181683162IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x560000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_ICON0x3c2540xd68PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                          RT_ICON0x3cfbc0x10828dBase III DBT, version number 0, next free block index 40
                          RT_ICON0x4d7e40x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                          RT_ICON0x51a0c0x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                          RT_ICON0x53fb40x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                          RT_ICON0x5505c0x468GLS_BINARY_LSB_FIRST
                          RT_GROUP_ICON0x554c40x5adata
                          RT_VERSION0x555200x36cdata
                          RT_MANIFEST0x5588c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                          192.168.2.5109.99.162.14497675872840032 07/23/22-18:24:15.530948TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249767587192.168.2.5109.99.162.14
                          192.168.2.5109.99.162.14497675872851779 07/23/22-18:24:15.530948TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49767587192.168.2.5109.99.162.14
                          192.168.2.5109.99.162.14497675872030171 07/23/22-18:24:15.530849TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49767587192.168.2.5109.99.162.14
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 23, 2022 18:24:14.473475933 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:14.519057035 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:14.519224882 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:14.631393909 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:14.631736040 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:14.677526951 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:14.678447962 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:14.724617958 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:14.729264021 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:14.779422998 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:14.993314981 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:15.025602102 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:15.025718927 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:15.301563025 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:15.347258091 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:15.385287046 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:15.470582008 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:15.473525047 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:15.481832027 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:15.527338982 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:15.527395964 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:15.530848980 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:15.530947924 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:15.531663895 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:15.531739950 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:24:15.576498985 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:15.577415943 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:19.454579115 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:24:19.603178978 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:25:53.465122938 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:25:53.513818026 CEST58749767109.99.162.14192.168.2.5
                          Jul 23, 2022 18:25:53.513911963 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:25:53.516002893 CEST49767587192.168.2.5109.99.162.14
                          Jul 23, 2022 18:25:53.564030886 CEST58749767109.99.162.14192.168.2.5
                          TimestampSource PortDest PortSource IPDest IP
                          Jul 23, 2022 18:24:13.498558044 CEST5432253192.168.2.58.8.8.8
                          Jul 23, 2022 18:24:13.551697969 CEST53543228.8.8.8192.168.2.5
                          Jul 23, 2022 18:24:14.334506035 CEST6270453192.168.2.58.8.8.8
                          Jul 23, 2022 18:24:14.387947083 CEST53627048.8.8.8192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Jul 23, 2022 18:24:13.498558044 CEST192.168.2.58.8.8.80xefc8Standard query (0)mail.rematinvest.roA (IP address)IN (0x0001)
                          Jul 23, 2022 18:24:14.334506035 CEST192.168.2.58.8.8.80x37c6Standard query (0)mail.rematinvest.roA (IP address)IN (0x0001)
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Jul 23, 2022 18:24:13.551697969 CEST8.8.8.8192.168.2.50xefc8No error (0)mail.rematinvest.rorematinvest.roCNAME (Canonical name)IN (0x0001)
                          Jul 23, 2022 18:24:13.551697969 CEST8.8.8.8192.168.2.50xefc8No error (0)rematinvest.ro109.99.162.14A (IP address)IN (0x0001)
                          Jul 23, 2022 18:24:14.387947083 CEST8.8.8.8192.168.2.50x37c6No error (0)mail.rematinvest.rorematinvest.roCNAME (Canonical name)IN (0x0001)
                          Jul 23, 2022 18:24:14.387947083 CEST8.8.8.8192.168.2.50x37c6No error (0)rematinvest.ro109.99.162.14A (IP address)IN (0x0001)
                          TimestampSource PortDest PortSource IPDest IPCommands
                          Jul 23, 2022 18:24:14.631393909 CEST58749767109.99.162.14192.168.2.5220-cpanel4.romtelecom.net ESMTP Exim 4.93 #2 Sat, 23 Jul 2022 19:24:14 +0300
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jul 23, 2022 18:24:14.631736040 CEST49767587192.168.2.5109.99.162.14EHLO 610930
                          Jul 23, 2022 18:24:14.677526951 CEST58749767109.99.162.14192.168.2.5250-cpanel4.romtelecom.net Hello 610930 [84.17.52.55]
                          250-SIZE 52428800
                          250-8BITMIME
                          250-PIPELINING
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jul 23, 2022 18:24:14.678447962 CEST49767587192.168.2.5109.99.162.14AUTH login ZmFjdHVyYXJlQHJlbWF0aW52ZXN0LnJv
                          Jul 23, 2022 18:24:14.724617958 CEST58749767109.99.162.14192.168.2.5334 UGFzc3dvcmQ6
                          Jul 23, 2022 18:24:14.779422998 CEST58749767109.99.162.14192.168.2.5235 Authentication succeeded
                          Jul 23, 2022 18:24:15.025602102 CEST58749767109.99.162.14192.168.2.5235 Authentication succeeded
                          Jul 23, 2022 18:24:15.301563025 CEST49767587192.168.2.5109.99.162.14MAIL FROM:<facturare@rematinvest.ro>
                          Jul 23, 2022 18:24:15.347258091 CEST58749767109.99.162.14192.168.2.5250 OK
                          Jul 23, 2022 18:24:15.385287046 CEST49767587192.168.2.5109.99.162.14RCPT TO:<jacksonhellen567@gmail.com>
                          Jul 23, 2022 18:24:15.473525047 CEST58749767109.99.162.14192.168.2.5250 Accepted
                          Jul 23, 2022 18:24:15.481832027 CEST49767587192.168.2.5109.99.162.14DATA
                          Jul 23, 2022 18:24:15.527395964 CEST58749767109.99.162.14192.168.2.5354 Enter message, ending with "." on a line by itself
                          Jul 23, 2022 18:24:15.531739950 CEST49767587192.168.2.5109.99.162.14.
                          Jul 23, 2022 18:24:19.454579115 CEST58749767109.99.162.14192.168.2.5250 OK id=1oFHvL-000Gi1-G9
                          Jul 23, 2022 18:25:53.465122938 CEST49767587192.168.2.5109.99.162.14QUIT
                          Jul 23, 2022 18:25:53.513818026 CEST58749767109.99.162.14192.168.2.5221 cpanel4.romtelecom.net closing connection

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:18:23:59
                          Start date:23/07/2022
                          Path:C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\DHL_119040 receipt document,pdf.exe"
                          Imagebase:0xef0000
                          File size:352408 bytes
                          MD5 hash:5A975876A6183035D674A69990752A0A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.457646522.0000000004C9A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:1
                          Start time:18:24:01
                          Start date:23/07/2022
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          Imagebase:0xa60000
                          File size:43176 bytes
                          MD5 hash:C09985AE74F0882F208D75DE27770DFA
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.450414167.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.450414167.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.449260040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.449260040.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.450990827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.450990827.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.709452659.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.709452659.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.712487104.0000000006B6A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.712112003.0000000006B13000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.449737218.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.449737218.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:moderate

                          Reset < >

                            Execution Graph

                            Execution Coverage:22.6%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:25.9%
                            Total number of Nodes:143
                            Total number of Limit Nodes:6
                            execution_graph 5590 176a197 5594 1769280 5590->5594 5598 1769279 5590->5598 5591 176a1b1 5595 17692c9 SetThreadContext 5594->5595 5597 1769341 5595->5597 5597->5591 5599 17692c9 SetThreadContext 5598->5599 5601 1769341 5599->5601 5601->5591 5602 176aa77 5603 176aa9a 5602->5603 5607 1769620 5603->5607 5611 1769618 5603->5611 5604 176aaf6 5608 176966c ReadProcessMemory 5607->5608 5610 17696e4 5608->5610 5610->5604 5612 176966c ReadProcessMemory 5611->5612 5614 17696e4 5612->5614 5614->5604 5615 176ad14 5619 17694c1 5615->5619 5623 17694c8 5615->5623 5616 176ad42 5620 1769514 WriteProcessMemory 5619->5620 5622 17695ad 5620->5622 5622->5616 5624 1769514 WriteProcessMemory 5623->5624 5626 17695ad 5624->5626 5626->5616 5627 176b0b5 5629 1769280 SetThreadContext 5627->5629 5630 1769279 SetThreadContext 5627->5630 5628 176b0cf 5629->5628 5630->5628 5756 1769cd0 5757 1769d02 5756->5757 5758 1769d4e 5757->5758 5759 176bda0 5 API calls 5757->5759 5760 176bd91 5 API calls 5757->5760 5759->5758 5760->5758 5769 176a298 5770 176a29c 5769->5770 5772 1769845 CreateProcessA 5770->5772 5773 1769850 CreateProcessA 5770->5773 5771 176a33e 5772->5771 5773->5771 5764 176b6c4 5765 176b6cb 5764->5765 5767 17693a0 VirtualAllocEx 5765->5767 5768 17693a8 VirtualAllocEx 5765->5768 5766 176b77d 5767->5766 5768->5766 5631 176ac65 5632 176ac6f 5631->5632 5636 1769190 5632->5636 5640 1769189 5632->5640 5633 176ac9f 5637 17691d4 ResumeThread 5636->5637 5639 1769220 5637->5639 5639->5633 5641 17691d4 ResumeThread 5640->5641 5643 1769220 5641->5643 5643->5633 5644 1769ce0 5645 1769d02 5644->5645 5646 1769d4e 5645->5646 5649 176bd91 5645->5649 5656 176bda0 5645->5656 5650 176bdbc 5649->5650 5663 176c521 5650->5663 5670 176bf08 5650->5670 5682 176bf18 5650->5682 5694 176c4bd 5650->5694 5651 176bdd1 5651->5646 5657 176bdbc 5656->5657 5659 176c521 3 API calls 5657->5659 5660 176c4bd 3 API calls 5657->5660 5661 176bf18 5 API calls 5657->5661 5662 176bf08 5 API calls 5657->5662 5658 176bdd1 5658->5646 5659->5658 5660->5658 5661->5658 5662->5658 5664 176c47b 5663->5664 5664->5663 5666 176c57e 5664->5666 5667 176c578 5664->5667 5701 1766798 5664->5701 5666->5667 5705 176d9f9 5666->5705 5709 176da00 5666->5709 5667->5651 5672 176bf0d 5670->5672 5671 176c0c2 5671->5651 5672->5671 5673 176c2ef 5672->5673 5676 176c471 5672->5676 5713 176d630 5672->5713 5717 176d629 5672->5717 5674 1766798 FindCloseChangeNotification 5673->5674 5674->5676 5675 176c57e 5675->5671 5680 176da00 EnumWindows 5675->5680 5681 176d9f9 EnumWindows 5675->5681 5676->5671 5676->5675 5677 1766798 FindCloseChangeNotification 5676->5677 5677->5676 5680->5675 5681->5675 5685 176bf3a 5682->5685 5683 176c0c2 5683->5651 5684 176c2ef 5687 1766798 FindCloseChangeNotification 5684->5687 5685->5683 5685->5684 5686 176c471 5685->5686 5690 176d630 CheckRemoteDebuggerPresent 5685->5690 5691 176d629 CheckRemoteDebuggerPresent 5685->5691 5686->5683 5688 176c57e 5686->5688 5689 1766798 FindCloseChangeNotification 5686->5689 5687->5686 5688->5683 5692 176da00 EnumWindows 5688->5692 5693 176d9f9 EnumWindows 5688->5693 5689->5686 5690->5685 5691->5685 5692->5688 5693->5688 5697 176c47b 5694->5697 5695 176c578 5695->5651 5696 176c57e 5696->5695 5699 176da00 EnumWindows 5696->5699 5700 176d9f9 EnumWindows 5696->5700 5697->5695 5697->5696 5698 1766798 FindCloseChangeNotification 5697->5698 5698->5697 5699->5696 5700->5696 5702 176d730 FindCloseChangeNotification 5701->5702 5704 176d7c0 5702->5704 5704->5664 5706 176da44 EnumWindows 5705->5706 5708 176daab 5706->5708 5708->5666 5711 176da44 EnumWindows 5709->5711 5712 176daab 5711->5712 5712->5666 5714 176d679 CheckRemoteDebuggerPresent 5713->5714 5716 176d6d0 5714->5716 5716->5672 5718 176d679 CheckRemoteDebuggerPresent 5717->5718 5720 176d6d0 5718->5720 5720->5672 5721 176b14e 5723 17694c1 WriteProcessMemory 5721->5723 5724 17694c8 WriteProcessMemory 5721->5724 5722 176b16f 5723->5722 5724->5722 5725 176b84e 5726 176b871 5725->5726 5728 17694c1 WriteProcessMemory 5726->5728 5729 17694c8 WriteProcessMemory 5726->5729 5727 176b8d0 5728->5727 5729->5727 5730 176b6ee 5731 176b6f9 5730->5731 5735 17693a0 5731->5735 5739 17693a8 5731->5739 5732 176b77d 5736 17693ec VirtualAllocEx 5735->5736 5738 1769464 5736->5738 5738->5732 5740 17693ec VirtualAllocEx 5739->5740 5742 1769464 5740->5742 5742->5732 5743 176a2ae 5744 176a2e9 5743->5744 5748 1769845 5744->5748 5752 1769850 5744->5752 5749 17698d7 CreateProcessA 5748->5749 5751 1769b2c 5749->5751 5751->5751 5753 17698d7 CreateProcessA 5752->5753 5755 1769b2c 5753->5755 5755->5755 5761 176d728 5762 176d775 FindCloseChangeNotification 5761->5762 5763 176d7c0 5762->5763

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 1766b48-1766b6a 1 1766b71-1766b7f 0->1 2 1766b6c 0->2 3 1766b95 1->3 4 1766b81-1766b93 1->4 2->1 5 1766b98 3->5 4->5 6 1766b9b 5->6 7 1766ba2-1766bbe 6->7 8 1766bc7-1766bc8 7->8 9 1766bc0 7->9 11 1766db4 8->11 9->6 9->8 10 1766d57-1766d5b 9->10 9->11 12 1766d1f-1766d2b 9->12 13 1766c18-1766c2c 9->13 14 1766c07-1766c16 9->14 15 1766cc2-1766cdb 9->15 16 1766ce0-1766cec 9->16 17 1766ca1 9->17 18 1766d8e-1766daf 9->18 19 1766bcd-1766bde 9->19 20 1766c4a-1766c9c 9->20 21 1766d6e-1766d75 10->21 22 1766d5d-1766d6c 10->22 30 1766dbe-1766dbf 11->30 38 1766d3e-1766d45 12->38 39 1766d2d-1766d3c 12->39 40 1766c33-1766c45 13->40 14->7 15->7 34 1766cee-1766cfd 16->34 35 1766cff-1766d06 16->35 23 1766cab-1766cbd 17->23 18->7 36 1766be0-1766bef 19->36 37 1766bf1-1766bf8 19->37 20->7 24 1766d7c-1766d89 21->24 22->24 23->7 24->7 30->12 41 1766d0d-1766d1a 34->41 35->41 43 1766bff-1766c05 36->43 37->43 44 1766d4c-1766d52 38->44 39->44 40->7 41->7 43->7 44->7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: M62$M62$^<]$f9o1$f9o1$f9o1$x$m$x$m
                            • API String ID: 0-4083327839
                            • Opcode ID: 4bde5be6620aa8bb6fff619fb6b45666a7cef7703a442def5fec77e10661dabf
                            • Instruction ID: 6f227800a0098fdb79e87012bf3e542815f456c992e6a6e2a3424935abb37220
                            • Opcode Fuzzy Hash: 4bde5be6620aa8bb6fff619fb6b45666a7cef7703a442def5fec77e10661dabf
                            • Instruction Fuzzy Hash: 757124B0D05219DFCF04CFA6C940AAEFBB9FB89304F648869D816AB254D7749A41CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 47 1766b39-1766b6a 48 1766b71-1766b7f 47->48 49 1766b6c 47->49 50 1766b95 48->50 51 1766b81-1766b93 48->51 49->48 52 1766b98 50->52 51->52 53 1766b9b 52->53 54 1766ba2-1766bbe 53->54 55 1766bc7-1766bc8 54->55 56 1766bc0 54->56 58 1766db4 55->58 56->53 56->55 57 1766d57-1766d5b 56->57 56->58 59 1766d1f-1766d2b 56->59 60 1766c18-1766c1b 56->60 61 1766c07-1766c16 56->61 62 1766cc2-1766cdb 56->62 63 1766ce0-1766cec 56->63 64 1766ca1 56->64 65 1766d8e-1766daf 56->65 66 1766bcd-1766bde 56->66 67 1766c4a-1766c9c 56->67 68 1766d6e-1766d75 57->68 69 1766d5d-1766d6c 57->69 77 1766dbe-1766dbf 58->77 85 1766d3e-1766d45 59->85 86 1766d2d-1766d3c 59->86 72 1766c23-1766c2c 60->72 61->54 62->54 81 1766cee-1766cfd 63->81 82 1766cff-1766d06 63->82 70 1766cab-1766cbd 64->70 65->54 83 1766be0-1766bef 66->83 84 1766bf1-1766bf8 66->84 67->54 71 1766d7c-1766d89 68->71 69->71 70->54 71->54 87 1766c33-1766c45 72->87 77->59 88 1766d0d-1766d1a 81->88 82->88 90 1766bff-1766c05 83->90 84->90 91 1766d4c-1766d52 85->91 86->91 87->54 88->54 90->54 91->54
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: M62$^<]$f9o1$f9o1$f9o1$x$m$x$m
                            • API String ID: 0-1673852399
                            • Opcode ID: 82b9c3d543e02f6d3e37d6148b0be2bb36dc6faa40c89cc49ec44522d4c95756
                            • Instruction ID: 3bdea018fbff4e6fd8ffbd79c7e3c5325f880a6045b78881bacf6d955fee1c72
                            • Opcode Fuzzy Hash: 82b9c3d543e02f6d3e37d6148b0be2bb36dc6faa40c89cc49ec44522d4c95756
                            • Instruction Fuzzy Hash: 26615570D05219CFCF14CFAAC540AAEFBB9FF89304F64886AD816AB254D7749A41CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 94 1768998-17689ba 96 17689c1-17689d2 94->96 97 17689bc 94->97 98 17689d5 96->98 97->96 99 17689dc-17689f8 98->99 100 1768a01-1768a02 99->100 101 17689fa 99->101 114 1768d04-1768d19 100->114 101->98 101->100 102 1768c16-1768c1a 101->102 103 1768bd7-1768bf6 101->103 104 1768ab7-1768abe 101->104 105 1768c95-1768ca1 101->105 106 1768a73-1768a8d 101->106 107 1768b50-1768b57 101->107 108 1768c7f-1768c86 101->108 109 1768bfb-1768c11 101->109 110 1768b18-1768b1d 101->110 111 1768c46-1768c55 101->111 112 1768b66-1768b72 101->112 113 1768a07-1768a13 101->113 101->114 115 1768ced-1768cff 101->115 116 1768acd-1768ad9 101->116 117 1768aaa-1768ab6 101->117 118 1768a48-1768a54 101->118 131 1768c1c-1768c2b 102->131 132 1768c2d-1768c34 102->132 103->99 104->104 133 1768ac0-1768ac8 104->133 120 1768ca3 105->120 121 1768ca8-1768cc7 105->121 155 1768a93-1768aa5 106->155 107->107 124 1768b59-1768b61 107->124 108->108 119 1768c88-1768c90 108->119 109->99 122 1768b30-1768b37 110->122 123 1768b1f-1768b2e 110->123 134 1768c57 111->134 135 1768c5c-1768c7a 111->135 125 1768b74 112->125 126 1768b79-1768b98 112->126 127 1768a15 113->127 128 1768a1a-1768a1f 113->128 115->99 136 1768ae0-1768ae5 116->136 137 1768adb 116->137 129 1768a56 118->129 130 1768a5b-1768a6e 118->130 119->99 120->121 140 1768cce-1768ce8 121->140 141 1768cc9 121->141 142 1768b3e-1768b4b 122->142 123->142 124->99 125->126 144 1768b9f-1768bb8 126->144 145 1768b9a 126->145 127->128 146 1768a32-1768a39 128->146 147 1768a21-1768a30 128->147 129->130 130->99 150 1768c3b-1768c41 131->150 132->150 133->99 134->135 135->99 138 1768ae7-1768af6 136->138 139 1768af8-1768aff 136->139 137->136 151 1768b06-1768b13 138->151 139->151 140->99 141->140 142->99 153 1768bbf-1768bd2 144->153 154 1768bba 144->154 145->144 152 1768a40-1768a46 146->152 147->152 150->99 151->99 152->99 153->99 154->153 155->99
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: ER~i$rD&[$rD&[
                            • API String ID: 0-3641059293
                            • Opcode ID: 36c1831d7321a8b10732b5fa91fd38edc7108122c65371741ddb52cbeca2e6a0
                            • Instruction ID: b3e336513e153dfd584eac6e52b5cd64050f16a7448c511628fa5ca7b6976a60
                            • Opcode Fuzzy Hash: 36c1831d7321a8b10732b5fa91fd38edc7108122c65371741ddb52cbeca2e6a0
                            • Instruction Fuzzy Hash: F2A18DB0E04309CFCB10CFA9D585AAEFBB6FB48344F248596C915AB345C7349A41CF96
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 156 176db08-176db43 157 176db45 156->157 158 176db4a-176dbbf call 176d2f8 * 2 call 1768998 156->158 157->158 166 176dbc7 158->166 167 176dbce-176dbea 166->167 168 176dbf3-176dbf4 167->168 169 176dbec 167->169 175 176de51-176de5a 168->175 169->166 169->168 170 176ddf7-176ddfd 169->170 171 176dd57-176dd5c 169->171 172 176dd95-176ddc5 call 176d2f8 * 2 169->172 173 176dc72-176dc96 call 176d2f8 169->173 174 176dd33-176dd3c 169->174 169->175 176 176dc5c-176dc63 169->176 177 176dc9b-176dcc0 call 176d2f8 169->177 178 176dbf9-176dc0b 169->178 179 176dc27-176dc30 169->179 180 176dcc5-176dd00 call 176d2f8 169->180 181 176dde0-176ddf6 call 176d2f8 169->181 182 176dd8f-176dd90 169->182 183 176de2d-176de4c 169->183 184 176dc0d-176dc25 169->184 185 176ddca-176ddd1 169->185 214 176de00 call 176df08 170->214 215 176de00 call 176def8 170->215 188 176dd5e-176dd6d 171->188 189 176dd6f-176dd76 171->189 172->167 173->167 186 176dd43-176dd52 174->186 187 176dd3e 174->187 176->176 194 176dc65-176dc6d 176->194 177->167 178->167 191 176dc32-176dc41 179->191 192 176dc43-176dc4a 179->192 211 176dd02-176dd11 180->211 212 176dd13-176dd1a 180->212 182->175 183->167 184->167 185->185 193 176ddd3-176dddb 185->193 186->167 187->186 199 176dd7d-176dd8a 188->199 189->199 201 176dc51-176dc57 191->201 192->201 193->167 194->167 199->167 201->167 204 176de06-176de28 204->167 213 176dd21-176dd2e 211->213 212->213 213->167 214->204 215->204
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: H\X $H\X $hlRH
                            • API String ID: 0-3254217069
                            • Opcode ID: 01a821ddb74eef2aee76c77b8da4aac0fc0b14fae8fee25befd9be5caa2ca176
                            • Instruction ID: a4ac7fefdcf4a6c9aec56006df8187d1d18f48467a18b0b9c460a56830f8cff8
                            • Opcode Fuzzy Hash: 01a821ddb74eef2aee76c77b8da4aac0fc0b14fae8fee25befd9be5caa2ca176
                            • Instruction Fuzzy Hash: B1A124B0E14209CFCB24CFEAD4846EEFBB6FB88310F14956AD959BB258D73099418F50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 216 176db18-176db43 217 176db45 216->217 218 176db4a-176dbbf call 176d2f8 * 2 call 1768998 216->218 217->218 226 176dbc7 218->226 227 176dbce-176dbea 226->227 228 176dbf3-176dbf4 227->228 229 176dbec 227->229 235 176de51-176de5a 228->235 229->226 229->228 230 176ddf7-176ddfd 229->230 231 176dd57-176dd5c 229->231 232 176dd95-176ddc5 call 176d2f8 * 2 229->232 233 176dc72-176dc96 call 176d2f8 229->233 234 176dd33-176dd3c 229->234 229->235 236 176dc5c-176dc63 229->236 237 176dc9b-176dcc0 call 176d2f8 229->237 238 176dbf9-176dc0b 229->238 239 176dc27-176dc30 229->239 240 176dcc5-176dd00 call 176d2f8 229->240 241 176dde0-176ddf6 call 176d2f8 229->241 242 176dd8f-176dd90 229->242 243 176de2d-176de4c 229->243 244 176dc0d-176dc25 229->244 245 176ddca-176ddd1 229->245 274 176de00 call 176df08 230->274 275 176de00 call 176def8 230->275 248 176dd5e-176dd6d 231->248 249 176dd6f-176dd76 231->249 232->227 233->227 246 176dd43-176dd52 234->246 247 176dd3e 234->247 236->236 254 176dc65-176dc6d 236->254 237->227 238->227 251 176dc32-176dc41 239->251 252 176dc43-176dc4a 239->252 271 176dd02-176dd11 240->271 272 176dd13-176dd1a 240->272 242->235 243->227 244->227 245->245 253 176ddd3-176dddb 245->253 246->227 247->246 259 176dd7d-176dd8a 248->259 249->259 261 176dc51-176dc57 251->261 252->261 253->227 254->227 259->227 261->227 264 176de06-176de28 264->227 273 176dd21-176dd2e 271->273 272->273 273->227 274->264 275->264
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: H\X $H\X $hlRH
                            • API String ID: 0-3254217069
                            • Opcode ID: e5abe5c267a39451e452f725340efbdc2e902e78cbd9a02961329474e68b5e1b
                            • Instruction ID: 3df5eeddeff1805b4ce450c3a80fec75918946c767d4c8ef931d4ec75305a28b
                            • Opcode Fuzzy Hash: e5abe5c267a39451e452f725340efbdc2e902e78cbd9a02961329474e68b5e1b
                            • Instruction Fuzzy Hash: 24A102B4E14209CFCB24CFEAD4846DEFBB6FB88310F24956AD959BB248D73099418F50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 276 176bf18-176bf38 277 176bf3f-176bf8a 276->277 278 176bf3a 276->278 280 176c0c2-176c108 call 1768998 call 1766774 call 1768998 call 1766780 277->280 281 176bf90 277->281 278->277 356 176c10d-176c128 280->356 282 176bf97-176bfb3 281->282 284 176bfb5 282->284 285 176bfbc-176bfbd 282->285 284->280 284->281 284->285 287 176c192-176c1ae 284->287 288 176c133-176c13a 284->288 289 176c1f0-176c1f7 284->289 290 176c03d-176c083 call 176675c 284->290 291 176c2bd 284->291 292 176c206-176c207 284->292 293 176bfe6-176c009 284->293 294 176c385-176c38c 284->294 295 176bfc2-176bfe4 284->295 296 176c222-176c227 284->296 297 176c0a0 call 1766768 284->297 298 176c20c-176c213 284->298 299 176c12d-176c12e 284->299 300 176c00b-176c038 284->300 301 176c269-176c270 284->301 302 176c149-176c150 284->302 285->301 341 176c1c7-176c1d1 287->341 342 176c1b0-176c1c5 287->342 288->288 307 176c13c-176c144 288->307 289->289 311 176c1f9-176c201 289->311 385 176c47b-176c4b1 call 1766798 290->385 400 176c089-176c09b 290->400 305 176c2c7-176c2e6 291->305 306 176c7a8-176c7b0 292->306 293->282 294->294 310 176c38e-176c399 294->310 295->282 313 176c240-176c24a 296->313 314 176c229-176c23e 296->314 327 176c0a5-176c0bd 297->327 298->298 312 176c215-176c21d 298->312 299->306 300->282 301->301 316 176c272-176c2b7 call 1768998 call 176678c 301->316 308 176c152-176c167 302->308 309 176c169-176c173 302->309 318 176c2ef-176c2f0 305->318 319 176c2e8 305->319 307->282 321 176c17d-176c18d 308->321 309->321 310->305 311->282 312->282 326 176c254-176c264 313->326 314->326 316->291 332 176c453-176c467 316->332 318->332 319->291 319->294 319->318 330 176c2f5-176c2fc 319->330 331 176c3d2-176c3d9 319->331 319->332 333 176c530-176c537 319->333 334 176c39e-176c3cd 319->334 335 176c33c-176c340 319->335 336 176c578-176c579 319->336 337 176c546-176c576 319->337 338 176c4ef 319->338 339 176c30b-176c33a 319->339 340 176c3eb-176c3fb 319->340 321->282 326->282 327->282 330->330 345 176c2fe-176c309 330->345 331->331 350 176c3db-176c3e6 331->350 353 176c469-176c478 call 1766798 332->353 333->333 352 176c539-176c544 333->352 334->353 346 176c342-176c357 335->346 347 176c359-176c363 335->347 336->306 351 176c4f9-176c518 337->351 338->351 339->305 418 176c3fe call 176d630 340->418 419 176c3fe call 176d629 340->419 348 176c1db-176c1eb 341->348 342->348 345->305 358 176c36d-176c380 346->358 347->358 348->282 350->305 361 176c52d-176c52e 351->361 362 176c51a 351->362 352->351 353->385 358->305 361->333 361->336 362->333 362->336 362->337 362->338 367 176c5d6-176c5dd 362->367 368 176c71c-176c744 362->368 369 176c626-176c66b call 1768998 call 17667a4 362->369 370 176c5a4 362->370 371 176c6c3-176c6fc 362->371 372 176c761-176c79e 362->372 373 176c521-176c528 362->373 374 176c6ad-176c6b4 362->374 375 176c5e9-176c5f0 362->375 376 176c749-176c75f 362->376 363 176c400-176c40e 377 176c427-176c431 363->377 378 176c410-176c425 363->378 367->367 380 176c5df-176c5e7 367->380 388 176c5ab-176c5c7 368->388 404 176c684-176c68e 369->404 405 176c66d-176c682 369->405 370->388 420 176c6ff call 176da00 371->420 421 176c6ff call 176d9f9 371->421 373->385 374->374 384 176c6b6-176c6be 374->384 381 176c606-176c60d 375->381 382 176c5f2-176c604 375->382 376->306 386 176c43b-176c44e 377->386 378->386 380->388 389 176c617-176c624 381->389 382->389 384->388 411 176c4b6-176c4e9 385->411 386->305 396 176c5d0-176c5d1 388->396 397 176c5c9 388->397 389->388 396->367 396->372 397->367 397->368 397->369 397->370 397->371 397->372 397->374 397->375 397->376 400->282 407 176c698-176c6a8 404->407 405->407 407->388 408 176c701-176c717 408->388 411->338 413 176c57e-176c5a1 call 1768998 call 1766774 411->413 413->370 418->363 419->363 420->408 421->408
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: ChangeCloseFindNotification
                            • String ID: *$X(tO
                            • API String ID: 2591292051-257287647
                            • Opcode ID: f9719fa04c42e4bcc4ac2c271a0b56b7963afaf577dc38a74c5896a6686187e8
                            • Instruction ID: c5f156a3a6b378952945bfdddd1c83d3f699964e9a35c1099236053dd83411e3
                            • Opcode Fuzzy Hash: f9719fa04c42e4bcc4ac2c271a0b56b7963afaf577dc38a74c5896a6686187e8
                            • Instruction Fuzzy Hash: 492237B4E05219CFDB25CFA5D980BEDFBB9AF49300F2490AAD949B7254DB344A81CF11
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 422 176bf08-176bf38 424 176bf3f-176bf8a 422->424 425 176bf3a 422->425 427 176c0c2-176c108 call 1768998 call 1766774 call 1768998 call 1766780 424->427 428 176bf90 424->428 425->424 503 176c10d-176c128 427->503 429 176bf97-176bfb3 428->429 431 176bfb5 429->431 432 176bfbc-176bfbd 429->432 431->427 431->428 431->432 434 176c192-176c1ae 431->434 435 176c133-176c13a 431->435 436 176c1f0-176c1f7 431->436 437 176c03d-176c083 call 176675c 431->437 438 176c2bd 431->438 439 176c206-176c207 431->439 440 176bfe6-176c009 431->440 441 176c385-176c38c 431->441 442 176bfc2-176bfe4 431->442 443 176c222-176c227 431->443 444 176c0a0 call 1766768 431->444 445 176c20c-176c213 431->445 446 176c12d-176c12e 431->446 447 176c00b-176c038 431->447 448 176c269-176c270 431->448 449 176c149-176c150 431->449 432->448 488 176c1c7-176c1d1 434->488 489 176c1b0-176c1c5 434->489 435->435 454 176c13c-176c144 435->454 436->436 458 176c1f9-176c201 436->458 532 176c47b-176c4b1 call 1766798 437->532 547 176c089-176c09b 437->547 452 176c2c7-176c2e6 438->452 453 176c7a8-176c7b0 439->453 440->429 441->441 457 176c38e-176c399 441->457 442->429 460 176c240-176c24a 443->460 461 176c229-176c23e 443->461 474 176c0a5-176c0bd 444->474 445->445 459 176c215-176c21d 445->459 446->453 447->429 448->448 463 176c272-176c2b7 call 1768998 call 176678c 448->463 455 176c152-176c167 449->455 456 176c169-176c173 449->456 465 176c2ef-176c2f0 452->465 466 176c2e8 452->466 454->429 468 176c17d-176c18d 455->468 456->468 457->452 458->429 459->429 473 176c254-176c264 460->473 461->473 463->438 479 176c453-176c467 463->479 465->479 466->438 466->441 466->465 477 176c2f5-176c2fc 466->477 478 176c3d2-176c3d9 466->478 466->479 480 176c530-176c537 466->480 481 176c39e-176c3cd 466->481 482 176c33c-176c340 466->482 483 176c578-176c579 466->483 484 176c546-176c576 466->484 485 176c4ef 466->485 486 176c30b-176c33a 466->486 487 176c3eb-176c3fb 466->487 468->429 473->429 474->429 477->477 492 176c2fe-176c309 477->492 478->478 497 176c3db-176c3e6 478->497 500 176c469-176c478 call 1766798 479->500 480->480 499 176c539-176c544 480->499 481->500 493 176c342-176c357 482->493 494 176c359-176c363 482->494 483->453 498 176c4f9-176c518 484->498 485->498 486->452 565 176c3fe call 176d630 487->565 566 176c3fe call 176d629 487->566 495 176c1db-176c1eb 488->495 489->495 492->452 505 176c36d-176c380 493->505 494->505 495->429 497->452 508 176c52d-176c52e 498->508 509 176c51a 498->509 499->498 500->532 505->452 508->480 508->483 509->480 509->483 509->484 509->485 514 176c5d6-176c5dd 509->514 515 176c71c-176c744 509->515 516 176c626-176c66b call 1768998 call 17667a4 509->516 517 176c5a4 509->517 518 176c6c3-176c6fc 509->518 519 176c761-176c79e 509->519 520 176c521-176c528 509->520 521 176c6ad-176c6b4 509->521 522 176c5e9-176c5f0 509->522 523 176c749-176c75f 509->523 510 176c400-176c40e 524 176c427-176c431 510->524 525 176c410-176c425 510->525 514->514 527 176c5df-176c5e7 514->527 535 176c5ab-176c5c7 515->535 551 176c684-176c68e 516->551 552 176c66d-176c682 516->552 517->535 567 176c6ff call 176da00 518->567 568 176c6ff call 176d9f9 518->568 520->532 521->521 531 176c6b6-176c6be 521->531 528 176c606-176c60d 522->528 529 176c5f2-176c604 522->529 523->453 533 176c43b-176c44e 524->533 525->533 527->535 536 176c617-176c624 528->536 529->536 531->535 558 176c4b6-176c4e9 532->558 533->452 543 176c5d0-176c5d1 535->543 544 176c5c9 535->544 536->535 543->514 543->519 544->514 544->515 544->516 544->517 544->518 544->519 544->521 544->522 544->523 547->429 554 176c698-176c6a8 551->554 552->554 554->535 555 176c701-176c717 555->535 558->485 560 176c57e-176c5a1 call 1768998 call 1766774 558->560 560->517 565->510 566->510 567->555 568->555
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: *$X(tO
                            • API String ID: 0-257287647
                            • Opcode ID: 46d87351f17193d7032a6f1b5d3b5cc0c29493037a197934c1a28c58e2eaa29c
                            • Instruction ID: 26c199121437f7693e9884bd78db5610f985cf891ec65f0cc1ef90a3bb92431b
                            • Opcode Fuzzy Hash: 46d87351f17193d7032a6f1b5d3b5cc0c29493037a197934c1a28c58e2eaa29c
                            • Instruction Fuzzy Hash: 9D125A74E05219CFEB25CFA5D980BEDFBB5AF49300F2490AAD949B7254DB348A81CF11
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 569 1768818-1768819 570 1768891-1768896 569->570 571 176881b-1768822 569->571 572 1768898 570->572 573 1768899-176889c 570->573 574 1768824-17688a4 571->574 575 1768825 571->575 572->573 576 176889d-17688a2 573->576 579 17688a5 574->579 575->576 578 1768827-1768839 575->578 576->579 582 17688a4 576->582 589 17688b1-17688b3 578->589 590 176883b-1768841 578->590 583 17688a7-17688aa 579->583 584 176891d-1768924 579->584 582->579 587 17688ad 583->587 588 17688ac-17688af 583->588 586 1768926 584->586 584->587 591 1768928-1768939 586->591 592 1768925-1768926 587->592 593 17688af 587->593 588->589 595 17688b9-17688c6 589->595 594 1768843-1768849 590->594 590->595 607 17689b1-17689b2 591->607 608 176893b-176894d 591->608 592->591 593->589 600 176888d-1768890 594->600 603 17688c8 595->603 604 17688c9-17688d9 595->604 600->570 603->604 615 1768951-176895e 604->615 616 17688db-17688e9 604->616 612 17689b3-17689ba 607->612 610 176898f-17689b0 608->610 611 176894f-176895e 608->611 610->612 617 1768961-1768968 611->617 613 17689c1-17689d2 612->613 614 17689bc 612->614 619 17689d5 613->619 614->613 615->617 616->617 646 17688eb-17688ee 616->646 621 176896f-1768972 617->621 622 176896a 617->622 623 17689dc-17689f8 619->623 625 176897c-1768985 621->625 622->621 626 1768a01-1768a02 623->626 627 17689fa 623->627 641 1768d04-1768d19 626->641 627->619 627->626 629 1768c16-1768c1a 627->629 630 1768bd7-1768bf6 627->630 631 1768ab7-1768abe 627->631 632 1768c95-1768ca1 627->632 633 1768a73 627->633 634 1768b50-1768b57 627->634 635 1768c7f-1768c86 627->635 636 1768bfb-1768c11 627->636 637 1768b18-1768b1d 627->637 638 1768c46-1768c55 627->638 639 1768b66-1768b72 627->639 640 1768a07-1768a13 627->640 627->641 642 1768ced-1768cff 627->642 643 1768acd-1768ad9 627->643 644 1768aaa-1768ab6 627->644 645 1768a48-1768a54 627->645 660 1768c1c-1768c2b 629->660 661 1768c2d-1768c34 629->661 630->623 631->631 662 1768ac0-1768ac8 631->662 648 1768ca3 632->648 649 1768ca8-1768cc7 632->649 680 1768a78-1768a8d 633->680 634->634 652 1768b59-1768b61 634->652 635->635 647 1768c88-1768c90 635->647 636->623 650 1768b30-1768b37 637->650 651 1768b1f-1768b2e 637->651 663 1768c57 638->663 664 1768c5c-1768c7a 638->664 653 1768b74 639->653 654 1768b79-1768b98 639->654 655 1768a15 640->655 656 1768a1a-1768a1f 640->656 642->623 665 1768ae0-1768ae5 643->665 666 1768adb 643->666 658 1768a56 645->658 659 1768a5b-1768a6e 645->659 673 17688f0 646->673 674 17688f1-1768904 646->674 647->623 648->649 669 1768cce-1768ce8 649->669 670 1768cc9 649->670 671 1768b3e-1768b4b 650->671 651->671 652->623 653->654 675 1768b9f-1768bb8 654->675 676 1768b9a 654->676 655->656 677 1768a32-1768a39 656->677 678 1768a21-1768a30 656->678 658->659 659->623 681 1768c3b-1768c41 660->681 661->681 662->623 663->664 664->623 667 1768ae7-1768af6 665->667 668 1768af8-1768aff 665->668 666->665 682 1768b06-1768b13 667->682 668->682 669->623 670->669 671->623 673->674 674->600 687 1768906-176891c 674->687 685 1768bbf-1768bd2 675->685 686 1768bba 675->686 676->675 684 1768a40-1768a46 677->684 678->684 688 1768a93-1768aa5 680->688 681->623 682->623 684->623 685->623 686->685 687->584 688->623
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: ER~i$rD&[
                            • API String ID: 0-1260428334
                            • Opcode ID: cc9554544471959aeb652f15e86fd9dcc7000a70ccdd2bd5faba51bfd35e038e
                            • Instruction ID: 048d43c2ab08877d960b12d35ff19326623e0b04b2e67c2a9e78bcb7a045ee90
                            • Opcode Fuzzy Hash: cc9554544471959aeb652f15e86fd9dcc7000a70ccdd2bd5faba51bfd35e038e
                            • Instruction Fuzzy Hash: 4AE1DE71D4870ACFCB11CFA8C4456AEFBFAFF45354B14859AC965AB216D3309A42CB83
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 690 1761224-1761226 691 1761228 690->691 692 1761229-176122c 690->692 691->692 693 1761237-1761238 692->693 694 176122e 692->694 697 1761239-176123a 693->697 695 1761230 694->695 696 1761231-1761232 694->696 695->696 698 1761234 696->698 699 1761235-1761236 696->699 700 176123c 697->700 701 176123d-176124e 697->701 698->699 699->693 699->697 700->701 702 1761250 701->702 703 1761251-176125a 701->703 704 176125c 703->704 705 176125d-1761262 703->705 704->705 706 1761264 705->706 707 1761265-176126a 705->707 706->707 708 176126c 707->708 709 176126d-176126e 707->709 708->709 710 1761278 708->710 711 1761270 709->711 712 1761271-1761276 709->712 713 1761279-176127a 710->713 711->712 712->710 712->713 714 176127c 713->714 715 176127d-1761282 713->715 714->715 716 1761284 715->716 717 1761285-1761286 715->717 716->717 718 1761288 717->718 719 1761289-176128e 717->719 718->719 720 1761290 719->720 721 1761291-1761292 719->721 720->721 722 1761294 721->722 723 1761295-1761296 721->723 722->723 724 1761298 723->724 725 1761299-176129a 723->725 724->725 726 176129c 725->726 727 176129d-17612d3 725->727 726->727 728 17612d5 727->728 729 17612da-1761326 727->729 728->729 732 1761329 729->732 733 1761330-176134c 732->733 734 1761355-1761356 733->734 735 176134e 733->735 736 17615a2-1761620 734->736 737 176135b-1761368 734->737 735->732 735->736 735->737 738 1761556-176156d 735->738 739 17613f4-17613fa 735->739 740 17614b2-17614e6 735->740 741 1761572-1761576 735->741 742 17613bb-17613ef 735->742 743 1761478-176148a 735->743 744 1761419-1761443 735->744 745 17613a4-17613b6 735->745 746 176148f-17614ad 735->746 747 176150b-1761523 735->747 748 17614eb-1761506 735->748 749 176138b-17613a2 735->749 750 1761448-176144c 735->750 774 1761622 call 1762655 736->774 775 1761622 call 1762570 736->775 776 1761622 call 1762580 736->776 777 1761622 call 1762691 736->777 778 1761622 call 176308e 736->778 779 1761622 call 176270f 736->779 782 176136b call 1761688 737->782 783 176136b call 1761679 737->783 738->733 780 17613fc call 1761b48 739->780 781 17613fc call 1761b38 739->781 740->733 751 1761578-1761587 741->751 752 1761589-1761590 741->752 742->733 743->733 744->733 745->733 746->733 766 1761536-176153d 747->766 767 1761525-1761534 747->767 748->733 749->733 753 176144e-176145d 750->753 754 176145f-1761466 750->754 756 1761597-176159d 751->756 752->756 759 176146d-1761473 753->759 754->759 756->733 759->733 760 1761402-1761414 760->733 770 1761544-1761551 766->770 767->770 768 1761371-1761389 768->733 770->733 773 1761628-1761632 774->773 775->773 776->773 777->773 778->773 779->773 780->760 781->760 782->768 783->768
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: -5&\$9~ln
                            • API String ID: 0-200604456
                            • Opcode ID: 05e4debde997b8c9c40ab58718181bbf6e2ad6fa32276bde347750fe4daf3798
                            • Instruction ID: b3fa420f6dcbd3951a30cc9af56a7699b784361502d6681bc4820a0465b97b72
                            • Opcode Fuzzy Hash: 05e4debde997b8c9c40ab58718181bbf6e2ad6fa32276bde347750fe4daf3798
                            • Instruction Fuzzy Hash: 17D153B0E092198FCB14CFA9C8449AEFBF6FF89300F64856AD816EB265D7359801CB55
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 784 1769ce0-1769d00 785 1769d07-1769d45 784->785 786 1769d02 784->786 787 1769d4e 785->787 860 1769d48 call 176bda0 785->860 861 1769d48 call 176bd91 785->861 786->785 788 1769d58-1769d7d 787->788 789 1769d86-1769d87 788->789 790 1769d7f 788->790 791 1769d8c-1769f3e call 1768998 * 12 789->791 792 176a049-176a0aa 789->792 790->787 790->791 790->792 793 1769fe6-176a00d 790->793 794 176a012-176a044 790->794 795 1769faa-1769fe1 790->795 796 1769f79-1769f94 790->796 797 1769f99-1769fa5 790->797 859 1769f49-1769f74 791->859 821 176a0b4-176a0d9 792->821 793->788 794->788 795->788 802 176bb1a-176bb57 796->802 797->788 808 176baa9-176bace 802->808 810 176bad7-176bad8 808->810 811 176bad0 808->811 813 176bb95-176bb9b 810->813 817 176badd-176bae4 810->817 811->802 811->813 814 176baf3-176bafa 811->814 815 176ba9f 811->815 816 176bb5c-176bb90 811->816 811->817 814->797 820 176bb00-176bb18 814->820 815->808 816->808 817->817 819 176bae6-176baf1 817->819 819->808 820->808 823 176a0e2-176ba9a 821->823 824 176a0db 821->824 823->813 823->815 824->787 824->791 824->792 824->793 824->794 824->795 824->796 824->797 828 176a148-176a14f 824->828 831 176a151-176a166 828->831 832 176a168-176a172 828->832 834 176a17c-176a192 831->834 832->834 834->821 859->788 860->787 861->787
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: m$!D
                            • API String ID: 0-959577562
                            • Opcode ID: 8f081e52400fa288aaa49bcbef431252a9ff17a031491590315655ff2a366769
                            • Instruction ID: c60301608590937e35bb63125d2051b7404d9bedc20560102d9d7769745eaaa8
                            • Opcode Fuzzy Hash: 8f081e52400fa288aaa49bcbef431252a9ff17a031491590315655ff2a366769
                            • Instruction Fuzzy Hash: BFD1F5B4E042298FDB69DF61D8406DDF7BAAF96300F10A5EA850DB7254DB705E808F51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 862 1769cd0-1769d00 863 1769d07-1769d45 862->863 864 1769d02 862->864 865 1769d4e 863->865 938 1769d48 call 176bda0 863->938 939 1769d48 call 176bd91 863->939 864->863 866 1769d58-1769d7d 865->866 867 1769d86-1769d87 866->867 868 1769d7f 866->868 869 1769d8c-1769d8d 867->869 870 176a049-176a0aa 867->870 868->865 868->869 868->870 871 1769fe6-176a00d 868->871 872 176a012-176a044 868->872 873 1769faa-1769fe1 868->873 874 1769f79-1769f94 868->874 875 1769f99-1769fa5 868->875 879 1769d95-1769d9b 869->879 899 176a0b4-176a0d9 870->899 871->866 872->866 873->866 880 176bb1a-176bb57 874->880 875->866 882 1769da6-1769dca call 1768998 879->882 886 176baa9-176bace 880->886 900 1769dd5-1769dea call 1768998 882->900 888 176bad7-176bad8 886->888 889 176bad0 886->889 891 176bb95-176bb9b 888->891 895 176badd-176bae4 888->895 889->880 889->891 892 176baf3-176bafa 889->892 893 176ba9f 889->893 894 176bb5c-176bb90 889->894 889->895 892->875 898 176bb00-176bb18 892->898 893->886 894->886 895->895 897 176bae6-176baf1 895->897 897->886 898->886 901 176a0e2-176ba9a 899->901 902 176a0db 899->902 908 1769def-1769e0c call 1768998 * 2 900->908 901->891 901->893 902->865 902->869 902->870 902->871 902->872 902->873 902->874 902->875 906 176a148-176a14f 902->906 909 176a151-176a166 906->909 910 176a168-176a172 906->910 915 1769e11-1769e24 908->915 912 176a17c-176a192 909->912 910->912 912->899 916 1769e2f-1769e4c call 1768998 * 2 915->916 920 1769e51-1769e6a 916->920 921 1769e71-1769e8e call 1768998 * 2 920->921 925 1769e93-1769eac 921->925 926 1769eb3-1769ed0 call 1768998 * 2 925->926 930 1769ed5-1769eee 926->930 931 1769ef5-1769f12 call 1768998 * 2 930->931 935 1769f17-1769f3e 931->935 937 1769f49-1769f74 935->937 937->866 938->865 939->865
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: m$!D
                            • API String ID: 0-959577562
                            • Opcode ID: 7a82124ab66beab96223e0ea1255025c3aef7cb848495859c401c3c2d609369c
                            • Instruction ID: f48398a5a756eb5b029b6bd497d3afca8644f98c4ba3d485bbb54e0bfd34e6b7
                            • Opcode Fuzzy Hash: 7a82124ab66beab96223e0ea1255025c3aef7cb848495859c401c3c2d609369c
                            • Instruction Fuzzy Hash: F1D102B4E042298FDB69CF61D8406DDF7BAAF95300F10A5EACA09B7254DB305F818F51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 940 176a148-176a14f 941 176a151-176a166 940->941 942 176a168-176a172 940->942 943 176a17c-176a192 941->943 942->943 944 176a0b4-176a0d9 943->944 945 176a0e2-176ba9a 944->945 946 176a0db 944->946 960 176bb95-176bb9b 945->960 961 176ba9f 945->961 946->940 948 1769fe6-176a00d 946->948 949 176a012-176a044 946->949 950 1769d4e 946->950 951 1769d8c-1769d8d 946->951 952 1769faa-1769fe1 946->952 953 1769f99-1769fa5 946->953 954 1769f79-1769f94 946->954 955 176a049-176a0aa 946->955 957 1769d58-1769d7d 948->957 949->957 950->957 965 1769d95-1769d9b 951->965 952->957 953->957 967 176bb1a-176bb57 954->967 955->944 962 1769d86-1769d87 957->962 963 1769d7f 957->963 966 176baa9-176bace 961->966 962->951 962->955 963->948 963->949 963->950 963->951 963->952 963->953 963->954 963->955 971 1769da6-1769dca call 1768998 965->971 968 176bad7-176bad8 966->968 969 176bad0 966->969 967->966 968->960 974 176badd-176bae4 968->974 969->960 969->961 969->967 972 176baf3-176bafa 969->972 973 176bb5c-176bb90 969->973 969->974 984 1769dd5-1769dea call 1768998 971->984 972->953 978 176bb00-176bb18 972->978 973->966 974->974 977 176bae6-176baf1 974->977 977->966 978->966 986 1769def-1769e0c call 1768998 * 2 984->986 990 1769e11-1769e24 986->990 991 1769e2f-1769e4c call 1768998 * 2 990->991 995 1769e51-1769e6a 991->995 996 1769e71-1769e8e call 1768998 * 2 995->996 1000 1769e93-1769eac 996->1000 1001 1769eb3-1769ed0 call 1768998 * 2 1000->1001 1005 1769ed5-1769eee 1001->1005 1006 1769ef5-1769f12 call 1768998 * 2 1005->1006 1010 1769f17-1769f3e 1006->1010 1012 1769f49-1769f74 1010->1012 1012->957
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: m$!D
                            • API String ID: 0-959577562
                            • Opcode ID: dac1ab35d1a20d68149274cf6d4abbca568c4f99bbf1ec267742e2a5037a49fe
                            • Instruction ID: e7f0dee414279b662dfe44ab27bf2893a7928e3173c07e7986687555a31bbda0
                            • Opcode Fuzzy Hash: dac1ab35d1a20d68149274cf6d4abbca568c4f99bbf1ec267742e2a5037a49fe
                            • Instruction Fuzzy Hash: 2FC1E3B4E042298FCB69DF61D940BDDB7BAAB96300F10A5EA850DB7254DB705FC08F51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1013 176a0e8-176a11a 1017 176a0b4-176a0d9 1013->1017 1018 176ba9f 1013->1018 1020 176a0e2-176ba9a 1017->1020 1021 176a0db 1017->1021 1019 176baa9-176bace 1018->1019 1022 176bad7-176bad8 1019->1022 1023 176bad0 1019->1023 1020->1018 1034 176bb95-176bb9b 1020->1034 1025 1769fe6-176a00d 1021->1025 1026 176a012-176a044 1021->1026 1027 1769d4e 1021->1027 1028 1769d8c-1769d8d 1021->1028 1029 1769faa-1769fe1 1021->1029 1030 176a148-176a14f 1021->1030 1031 1769f99-1769fa5 1021->1031 1032 1769f79-1769f94 1021->1032 1033 176a049-176a0aa 1021->1033 1022->1034 1037 176badd-176bae4 1022->1037 1023->1018 1023->1034 1035 176baf3-176bafa 1023->1035 1036 176bb5c-176bb90 1023->1036 1023->1037 1038 176bb1a-176bb57 1023->1038 1040 1769d58-1769d7d 1025->1040 1026->1040 1027->1040 1050 1769d95-1769d9b 1028->1050 1029->1040 1041 176a151-176a166 1030->1041 1042 176a168-176a172 1030->1042 1031->1040 1032->1038 1033->1017 1035->1031 1044 176bb00-176bb18 1035->1044 1036->1019 1037->1037 1043 176bae6-176baf1 1037->1043 1038->1019 1048 1769d86-1769d87 1040->1048 1049 1769d7f 1040->1049 1051 176a17c-176a192 1041->1051 1042->1051 1043->1019 1044->1019 1048->1028 1048->1033 1049->1025 1049->1026 1049->1027 1049->1028 1049->1029 1049->1031 1049->1032 1049->1033 1055 1769da6-1769dca call 1768998 1050->1055 1051->1017 1061 1769dd5-1769dea call 1768998 1055->1061 1063 1769def-1769e0c call 1768998 * 2 1061->1063 1067 1769e11-1769e24 1063->1067 1068 1769e2f-1769e4c call 1768998 * 2 1067->1068 1072 1769e51-1769e6a 1068->1072 1073 1769e71-1769e8e call 1768998 * 2 1072->1073 1077 1769e93-1769eac 1073->1077 1078 1769eb3-1769ed0 call 1768998 * 2 1077->1078 1082 1769ed5-1769eee 1078->1082 1083 1769ef5-1769f12 call 1768998 * 2 1082->1083 1087 1769f17-1769f3e 1083->1087 1089 1769f49-1769f74 1087->1089 1089->1040
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: m$!D
                            • API String ID: 0-959577562
                            • Opcode ID: e3778c18aa8c36b59e4cc653a10bb22c3a7a494234bf7a5b4261dc9833b94acd
                            • Instruction ID: ec1faf4ce2acd2d095adf2c373ae7e26f61e77941a1860722a1d6d1561f05cd2
                            • Opcode Fuzzy Hash: e3778c18aa8c36b59e4cc653a10bb22c3a7a494234bf7a5b4261dc9833b94acd
                            • Instruction Fuzzy Hash: 49C1F5B4E142298FCB69DF60D840BDDB7BAAF96300F10A4EAD609B7254DB705F808F51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1090 176a12c-176a143 1091 176a0b4-176a0d9 1090->1091 1092 176ba9f 1090->1092 1094 176a0e2-176ba9a 1091->1094 1095 176a0db 1091->1095 1093 176baa9-176bace 1092->1093 1096 176bad7-176bad8 1093->1096 1097 176bad0 1093->1097 1094->1092 1108 176bb95-176bb9b 1094->1108 1099 1769fe6-176a00d 1095->1099 1100 176a012-176a044 1095->1100 1101 1769d4e 1095->1101 1102 1769d8c-1769d8d 1095->1102 1103 1769faa-1769fe1 1095->1103 1104 176a148-176a14f 1095->1104 1105 1769f99-1769fa5 1095->1105 1106 1769f79-1769f94 1095->1106 1107 176a049-176a0aa 1095->1107 1096->1108 1111 176badd-176bae4 1096->1111 1097->1092 1097->1108 1109 176baf3-176bafa 1097->1109 1110 176bb5c-176bb90 1097->1110 1097->1111 1112 176bb1a-176bb57 1097->1112 1114 1769d58-1769d7d 1099->1114 1100->1114 1101->1114 1124 1769d95-1769d9b 1102->1124 1103->1114 1115 176a151-176a166 1104->1115 1116 176a168-176a172 1104->1116 1105->1114 1106->1112 1107->1091 1109->1105 1118 176bb00-176bb18 1109->1118 1110->1093 1111->1111 1117 176bae6-176baf1 1111->1117 1112->1093 1122 1769d86-1769d87 1114->1122 1123 1769d7f 1114->1123 1125 176a17c-176a192 1115->1125 1116->1125 1117->1093 1118->1093 1122->1102 1122->1107 1123->1099 1123->1100 1123->1101 1123->1102 1123->1103 1123->1105 1123->1106 1123->1107 1129 1769da6-1769dca call 1768998 1124->1129 1125->1091 1135 1769dd5-1769dea call 1768998 1129->1135 1137 1769def-1769e0c call 1768998 * 2 1135->1137 1141 1769e11-1769e24 1137->1141 1142 1769e2f-1769e4c call 1768998 * 2 1141->1142 1146 1769e51-1769e6a 1142->1146 1147 1769e71-1769e8e call 1768998 * 2 1146->1147 1151 1769e93-1769eac 1147->1151 1152 1769eb3-1769ed0 call 1768998 * 2 1151->1152 1156 1769ed5-1769eee 1152->1156 1157 1769ef5-1769f12 call 1768998 * 2 1156->1157 1161 1769f17-1769f3e 1157->1161 1163 1769f49-1769f74 1161->1163 1163->1114
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: m$!D
                            • API String ID: 0-959577562
                            • Opcode ID: cee1ea7ddda7422fdbd9bafe9aa07de38216e0a475ab013af4530f1ed387503a
                            • Instruction ID: d8cf09d82b786d9431546ca638871e07042d89908ac6220d5151255e76e6cc7a
                            • Opcode Fuzzy Hash: cee1ea7ddda7422fdbd9bafe9aa07de38216e0a475ab013af4530f1ed387503a
                            • Instruction Fuzzy Hash: 40C1F4B4E042298FCB69DF60D840BDDB7BAAF96300F10A5EA9609B7254DB705FC08F51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1164 17612b0-17612d3 1165 17612d5 1164->1165 1166 17612da-1761326 1164->1166 1165->1166 1169 1761329 1166->1169 1170 1761330-176134c 1169->1170 1171 1761355-1761356 1170->1171 1172 176134e 1170->1172 1173 17615a2-1761620 1171->1173 1174 176135b-1761368 1171->1174 1172->1169 1172->1173 1172->1174 1175 1761556-176156d 1172->1175 1176 17613f4-17613fa 1172->1176 1177 17614b2-17614e6 1172->1177 1178 1761572-1761576 1172->1178 1179 17613bb-17613ef 1172->1179 1180 1761478-176148a 1172->1180 1181 1761419-1761443 1172->1181 1182 17613a4-17613b6 1172->1182 1183 176148f-17614ad 1172->1183 1184 176150b-1761523 1172->1184 1185 17614eb-1761506 1172->1185 1186 176138b-17613a2 1172->1186 1187 1761448-176144c 1172->1187 1213 1761622 call 1762655 1173->1213 1214 1761622 call 1762570 1173->1214 1215 1761622 call 1762580 1173->1215 1216 1761622 call 1762691 1173->1216 1217 1761622 call 176308e 1173->1217 1218 1761622 call 176270f 1173->1218 1211 176136b call 1761688 1174->1211 1212 176136b call 1761679 1174->1212 1175->1170 1219 17613fc call 1761b48 1176->1219 1220 17613fc call 1761b38 1176->1220 1177->1170 1188 1761578-1761587 1178->1188 1189 1761589-1761590 1178->1189 1179->1170 1180->1170 1181->1170 1182->1170 1183->1170 1203 1761536-176153d 1184->1203 1204 1761525-1761534 1184->1204 1185->1170 1186->1170 1190 176144e-176145d 1187->1190 1191 176145f-1761466 1187->1191 1193 1761597-176159d 1188->1193 1189->1193 1196 176146d-1761473 1190->1196 1191->1196 1193->1170 1196->1170 1197 1761402-1761414 1197->1170 1207 1761544-1761551 1203->1207 1204->1207 1205 1761371-1761389 1205->1170 1207->1170 1210 1761628-1761632 1211->1205 1212->1205 1213->1210 1214->1210 1215->1210 1216->1210 1217->1210 1218->1210 1219->1197 1220->1197
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: -5&\$9~ln
                            • API String ID: 0-200604456
                            • Opcode ID: 15a9d23d092ac096a5be1cff0f86ffc02b8131cafabea53b004c0f56594d5d23
                            • Instruction ID: 67f6de637488b31c1f6bf55e0d775284cab2bc3fb86978101a04c0fefe4b2909
                            • Opcode Fuzzy Hash: 15a9d23d092ac096a5be1cff0f86ffc02b8131cafabea53b004c0f56594d5d23
                            • Instruction Fuzzy Hash: ACB1D2B4E052198FDB04CFAAC9849EEFBB6FF89300F64856AD906BB354D7319901CB54
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: m$!D
                            • API String ID: 0-959577562
                            • Opcode ID: eb31b93338d97ab91f04287f9683053a7fd6e3b3ced663a282144aa08a3d5d05
                            • Instruction ID: 1665bf6f1cd744afbb90816e693a90e532eda7d05c4f5fb5bb327a33e2d56866
                            • Opcode Fuzzy Hash: eb31b93338d97ab91f04287f9683053a7fd6e3b3ced663a282144aa08a3d5d05
                            • Instruction Fuzzy Hash: 27C1F4B4E042298FCB69DF60D840BDDB7BAAF96300F10A5EA9609B7254DB745F808F51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: ER~i$rD&[
                            • API String ID: 0-1260428334
                            • Opcode ID: 9b2cc04ca95d361e3927112b5e705e9a42f1e852aa684e742f4ab2677c179594
                            • Instruction ID: f23db317892e7671d343aef89d5ce132f1858b64f8c153a4f3ca6cc6700c3fbd
                            • Opcode Fuzzy Hash: 9b2cc04ca95d361e3927112b5e705e9a42f1e852aa684e742f4ab2677c179594
                            • Instruction Fuzzy Hash: 6EA16A70E0421ACFCB10CFA9D485AAEFBF6FB88344F248596C915A7255D334DA42CF96
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0176D6BE
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: CheckDebuggerPresentRemote
                            • String ID:
                            • API String ID: 3662101638-0
                            • Opcode ID: 3d9fa6be171003ab9859b7e76536e5ba5d3f716edf180a7a3b2215d8cc896be5
                            • Instruction ID: 389f51245402083315c0b57241e5e778bc3163f033eef73151b6d31f7fedc4fa
                            • Opcode Fuzzy Hash: 3d9fa6be171003ab9859b7e76536e5ba5d3f716edf180a7a3b2215d8cc896be5
                            • Instruction Fuzzy Hash: 8931AAB4D012189FDB10CFE9D884AEEFBF9BB49314F14842AE815B7200C775A945CF94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $k!>
                            • API String ID: 0-124308476
                            • Opcode ID: 18c688e0e70e1a4baf98692a8a776780d086a1937585456526b4da6e699f1096
                            • Instruction ID: 5db65d411e180370e836679e332569690e553b2693428af8ea7e31f87650a15e
                            • Opcode Fuzzy Hash: 18c688e0e70e1a4baf98692a8a776780d086a1937585456526b4da6e699f1096
                            • Instruction Fuzzy Hash: 5B510870E04219CFDB08CFAAC9455AEFBF6BFC9300F14C16AD519A7255E7348A418B69
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID: $k!>
                            • API String ID: 0-124308476
                            • Opcode ID: 7d20c7d294acfc140642d680505ad43b80071f6d1c2976953e76e1decce729bb
                            • Instruction ID: 6b941bbf6d0015628789171afa31d1da5a3d333037d2384c3fed358873ab3427
                            • Opcode Fuzzy Hash: 7d20c7d294acfc140642d680505ad43b80071f6d1c2976953e76e1decce729bb
                            • Instruction Fuzzy Hash: 97511570E04219CFCB08CFAAC9446AEFBF6BFC8300F14D16AD919B7254E73499418B69
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4880204fa6ee6462e63c5f5ea5356940f9e5680b2e8b8236fea9209d47056543
                            • Instruction ID: 577d15770c267ebbd13886812f9ee7f1e59f4c8246abc5ab6422cc66f6f1fd0e
                            • Opcode Fuzzy Hash: 4880204fa6ee6462e63c5f5ea5356940f9e5680b2e8b8236fea9209d47056543
                            • Instruction Fuzzy Hash: 6C818C74C093988FCB02DFA8C8946CEBFB5BF06314F1945ABD485AB252DB784849CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8b5eb7a923d8c582d4fb88a4672711f8466df04f5bc30f899d408a4309bb49b8
                            • Instruction ID: 02a31b5df7a0f4ad006a1b6d1f541f9df3d681dd45340da8b8335656211fa66c
                            • Opcode Fuzzy Hash: 8b5eb7a923d8c582d4fb88a4672711f8466df04f5bc30f899d408a4309bb49b8
                            • Instruction Fuzzy Hash: AD5122B0D04258CFDB15CFA9C884BEEFBB6BF49304F14812AE855AB251DB749885CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: ChangeCloseFindNotification
                            • String ID:
                            • API String ID: 2591292051-0
                            • Opcode ID: 46e9ce85ec1a37c0611e6b8cd70cdfdfc2725a6890037cfa3b37ac8dc8b17b0c
                            • Instruction ID: 250eeb4dccc2718c5e87516ed9278e92281cb46d5c7c70e01bef5e6c2902f0d7
                            • Opcode Fuzzy Hash: 46e9ce85ec1a37c0611e6b8cd70cdfdfc2725a6890037cfa3b37ac8dc8b17b0c
                            • Instruction Fuzzy Hash: 17718974D05218CFDB25CFA9D9807EDFBB5BB89300F2480AAD94AA7345DB349981CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 314dff180e1a608a705105b54455f99c9aed70ed761ab46e8a7d7cd9d595b687
                            • Instruction ID: 094757b4767afe93f3041947765ca4e2ab8a9e4df7d539dca6fcf51cabe861aa
                            • Opcode Fuzzy Hash: 314dff180e1a608a705105b54455f99c9aed70ed761ab46e8a7d7cd9d595b687
                            • Instruction Fuzzy Hash: E051EEB4D00218DFDB15CFA9D884BEEFBB6BB49304F14812AE855AB250DB749885CF85
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1338e80d249d3e7298c18a49b1541e0f82112da71d3e8874b43c8d6e9d6d1a67
                            • Instruction ID: 5a8bfdae21c63a40b3f77157b854de5740803dada9033ac5ad2f9701f554b3a2
                            • Opcode Fuzzy Hash: 1338e80d249d3e7298c18a49b1541e0f82112da71d3e8874b43c8d6e9d6d1a67
                            • Instruction Fuzzy Hash: B9310671E006188BDB18CFAAD94469EBBB6BFC8311F14C0AAD909AB268DB315945CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a290a9c2a139d1b6a92df0a7a1707d27a0a99ce533eb13f8047d3aaf6e8276b9
                            • Instruction ID: a129a7b0d044c815d789e1e20682d3b16d5941512bed143588087f6c54afc6d0
                            • Opcode Fuzzy Hash: a290a9c2a139d1b6a92df0a7a1707d27a0a99ce533eb13f8047d3aaf6e8276b9
                            • Instruction Fuzzy Hash: 1021EAB0E006588BDB19CFABC95479EBFF3AFC9310F18C16AD409AA268DB741945CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 01769B17
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: CreateProcess
                            • String ID:
                            • API String ID: 963392458-0
                            • Opcode ID: 69ab01aac183c3bdf67b28e9226670b0e16d76e2fb2430891109f8242e4b3734
                            • Instruction ID: 12bcf13768c35538fa79dd01c2a939656804ce75d76463859c3c5d8e994a2814
                            • Opcode Fuzzy Hash: 69ab01aac183c3bdf67b28e9226670b0e16d76e2fb2430891109f8242e4b3734
                            • Instruction Fuzzy Hash: D7C12671D0022D8FDF24CFA8C841BEEBBB5BB45308F0495AAD949B7240DB709A85CF85
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 01769B17
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: CreateProcess
                            • String ID:
                            • API String ID: 963392458-0
                            • Opcode ID: 6b3d0ec959208d86ac4b99e7bb557e23b47275dcc684d5bbcd2ba481b6928337
                            • Instruction ID: 7eadc07300854de182da977338c727027cc9fb7e82578a4affc12e0b3a4a310a
                            • Opcode Fuzzy Hash: 6b3d0ec959208d86ac4b99e7bb557e23b47275dcc684d5bbcd2ba481b6928337
                            • Instruction Fuzzy Hash: 9DC11571D0022D8FDF25CFA8C841BEEBBB5BB49308F0495A9D949B7240DB709A85CF95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0176959B
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: a313edcee0d4b85109734fecceb26b16b9dff59292408c19424e938f349ac351
                            • Instruction ID: 6774b8e0637b5a58133c8a9b91ab402e56e635c7009fa61f6e3e703c0e1e5f1a
                            • Opcode Fuzzy Hash: a313edcee0d4b85109734fecceb26b16b9dff59292408c19424e938f349ac351
                            • Instruction Fuzzy Hash: 5A41BAB4D012589FDF00CFA9D984AEEFBF5BB49314F24942AE818B7240D734AA45CF54
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0176959B
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: MemoryProcessWrite
                            • String ID:
                            • API String ID: 3559483778-0
                            • Opcode ID: 6f51d52d4e6dafb47b8bc394043f7c02ed68f7f1ff854a1589c8677aecd30b9f
                            • Instruction ID: f4b97696ac4925bcc5000415dc5be8597cabab903e5a196233a432cb2d055a53
                            • Opcode Fuzzy Hash: 6f51d52d4e6dafb47b8bc394043f7c02ed68f7f1ff854a1589c8677aecd30b9f
                            • Instruction Fuzzy Hash: 6C41B8B4D012589FDF00CFA9D984AEEFBF5BB49314F24942AE818B7240D734AA45CF64
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 017696D2
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: MemoryProcessRead
                            • String ID:
                            • API String ID: 1726664587-0
                            • Opcode ID: 9f10551fc7fecc151fe1ee5de8965aea6719b78912ac35ba5557f38a0d665b8e
                            • Instruction ID: ec3e24a7bc3ed2fee2a99337a9cdaf36797059e5574a1aad7c8eb41c44e2cb28
                            • Opcode Fuzzy Hash: 9f10551fc7fecc151fe1ee5de8965aea6719b78912ac35ba5557f38a0d665b8e
                            • Instruction Fuzzy Hash: 1C4196B9D002589FCF10CFE9E884AEEFBB5BB49314F14942AE815BB200D735A945DF64
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 017696D2
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: MemoryProcessRead
                            • String ID:
                            • API String ID: 1726664587-0
                            • Opcode ID: ceb9c3e1c626c9e77329046a5ee5f56b7af65be3e7b1e88beadfe336482cfc97
                            • Instruction ID: bffa8ad2005ffc09e90d01beedfe192de3cf99515aa589b33b30806503738923
                            • Opcode Fuzzy Hash: ceb9c3e1c626c9e77329046a5ee5f56b7af65be3e7b1e88beadfe336482cfc97
                            • Instruction Fuzzy Hash: C34195B8D042589FCF00CFEAD884AEEFBB5BB09314F14942AE815B7200D735A945CF64
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 01769452
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: f7c3662e7f8728f1593e87805db7117fbe7ae38d76b0bb90176928affb1c0822
                            • Instruction ID: 27268e5bebcb0d4e8cbe5ca47cd76cf535f1bda4a622032c87a8ad85504a5a0d
                            • Opcode Fuzzy Hash: f7c3662e7f8728f1593e87805db7117fbe7ae38d76b0bb90176928affb1c0822
                            • Instruction Fuzzy Hash: 3B4185B9D00258DFCF10CFA9D880AEEFBB5BB49324F14942AE815BB210D735A946CF54
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 01769452
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: AllocVirtual
                            • String ID:
                            • API String ID: 4275171209-0
                            • Opcode ID: 5aef4c4e9a7dbf696238088e0fb20d29f339b244edb5c1bf24d941e0f88fbf40
                            • Instruction ID: 4fe8f5b796ecc31383c4968b3c9740f3db9e272ba71367078a8de89f1545deb6
                            • Opcode Fuzzy Hash: 5aef4c4e9a7dbf696238088e0fb20d29f339b244edb5c1bf24d941e0f88fbf40
                            • Instruction Fuzzy Hash: D83197B8D002589FCF00CFE9D880ADEFBB9BB49314F10942AE815BB200D735A945CF54
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetThreadContext.KERNELBASE(?,?), ref: 0176932F
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: ContextThread
                            • String ID:
                            • API String ID: 1591575202-0
                            • Opcode ID: 50b7998394e8f25b50dbaa1798610e1b75cb3ca034beabf7a258d5118d473088
                            • Instruction ID: 398e86b3057b6620cd27ffb5e8978a61612a354fc5b6374a117ff0f09a46a7e4
                            • Opcode Fuzzy Hash: 50b7998394e8f25b50dbaa1798610e1b75cb3ca034beabf7a258d5118d473088
                            • Instruction Fuzzy Hash: 7841ABB4D012589FDB14CFEAD884AEEFBB5BF48314F14842AE815B7240D738A985CF94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetThreadContext.KERNELBASE(?,?), ref: 0176932F
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: ContextThread
                            • String ID:
                            • API String ID: 1591575202-0
                            • Opcode ID: 824219808a2009b3a6252f303e536b3d5bc0a97925c8950b730a2841c76dcc1d
                            • Instruction ID: 32b3e9f093781878220f1696587307be2109bb75eff5a15dc1ccbe01d8acd11c
                            • Opcode Fuzzy Hash: 824219808a2009b3a6252f303e536b3d5bc0a97925c8950b730a2841c76dcc1d
                            • Instruction Fuzzy Hash: 9A31BAB4D012589FDB14CFEAD884AEEFBF5BB48314F14842AE815B7240D738A949CF94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: EnumWindows
                            • String ID:
                            • API String ID: 1129996299-0
                            • Opcode ID: 33a18d667d8b67299bef9953158ae647e5a8b36134de22188279453543956b1f
                            • Instruction ID: beb8ef997cc078ebadc6d796e088ca148e6604ce851f8d892f77fb97fc2c900e
                            • Opcode Fuzzy Hash: 33a18d667d8b67299bef9953158ae647e5a8b36134de22188279453543956b1f
                            • Instruction Fuzzy Hash: 7F31CAB4D052189FDB14CFE9D884AEEFBB5BF49314F14942AE805B7240C774AA46CF94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: EnumWindows
                            • String ID:
                            • API String ID: 1129996299-0
                            • Opcode ID: 56048b279bb93b1591d9ab2bb4f9b7d84a84527b3522fd6efacac284631e3c70
                            • Instruction ID: b29ba893cb623a5e00d87c03013aacc1f1f3dabb9eb3bcc6397a893cc4381810
                            • Opcode Fuzzy Hash: 56048b279bb93b1591d9ab2bb4f9b7d84a84527b3522fd6efacac284631e3c70
                            • Instruction Fuzzy Hash: 6D31B8B4D052189FDB14CFE9D884AEEFBB9BF49314F14942AE805B7200C774AA46CF94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 0176D6BE
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: CheckDebuggerPresentRemote
                            • String ID:
                            • API String ID: 3662101638-0
                            • Opcode ID: a71835e5f4cfcfba8ee3b375c78c4df3af6ed12025493aa11e8a5e1327e718e9
                            • Instruction ID: 46cad2e2b07b95bd0a0c1393ff4b9e41968560223e82f7fa7d5d524984c55b9e
                            • Opcode Fuzzy Hash: a71835e5f4cfcfba8ee3b375c78c4df3af6ed12025493aa11e8a5e1327e718e9
                            • Instruction Fuzzy Hash: B131B8B8D012189FDB10CFE9D880AEEFBB5BB49314F14842AE809B7200C734A945CF94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ResumeThread.KERNELBASE(?), ref: 0176920E
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: ResumeThread
                            • String ID:
                            • API String ID: 947044025-0
                            • Opcode ID: 35196a36234ab812ec5c012ff4b4ec19da6dc303d92fda6e98342fe315b58271
                            • Instruction ID: 68fe84336538d14db1f9854213e7b697ea6ed2d97142d818be4bd69b64cb3c46
                            • Opcode Fuzzy Hash: 35196a36234ab812ec5c012ff4b4ec19da6dc303d92fda6e98342fe315b58271
                            • Instruction Fuzzy Hash: 8431CCB4D052189FDF14CFA9D884AEEFBB9AF49314F14842AE819B7300D735A905CF94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ResumeThread.KERNELBASE(?), ref: 0176920E
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: ResumeThread
                            • String ID:
                            • API String ID: 947044025-0
                            • Opcode ID: 8aa43c95a8bb785981e8a7b997ef5bdedc4c34f2f2c5b865b918e505f363132f
                            • Instruction ID: 6855bdf33416c5f3772b518ef68bada91b6d4cfd5bdeb8461c06941998765788
                            • Opcode Fuzzy Hash: 8aa43c95a8bb785981e8a7b997ef5bdedc4c34f2f2c5b865b918e505f363132f
                            • Instruction Fuzzy Hash: F031AAB4D052189FDF14CFAAE884AEEFBB9AF49314F14842AE915B7300D734A945CF94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • FindCloseChangeNotification.KERNELBASE(?), ref: 0176D7AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: ChangeCloseFindNotification
                            • String ID:
                            • API String ID: 2591292051-0
                            • Opcode ID: 9545c51bb670ca39cc8e5f6fa6291fa7faa462f04e2f20adf39e2c3d82680a3a
                            • Instruction ID: 3f543823419dd05c0f52f53567a003bcd264126431e8a91e1bebb0cd857757e4
                            • Opcode Fuzzy Hash: 9545c51bb670ca39cc8e5f6fa6291fa7faa462f04e2f20adf39e2c3d82680a3a
                            • Instruction Fuzzy Hash: 3831ACB8D102189FCB10CFA9E484AEEFBF4BB49324F14906AE815B7310C334A945CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • FindCloseChangeNotification.KERNELBASE(?), ref: 0176D7AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID: ChangeCloseFindNotification
                            • String ID:
                            • API String ID: 2591292051-0
                            • Opcode ID: 858e49fdbc7ad71f60e3e61bb678aa7807c3c0f9f15b92687bd0640dc00d2ff8
                            • Instruction ID: 7db7ef645d7c2a998aa56380d5d7cea420f2c9e9fe27b0a52e9d01a85bdb8269
                            • Opcode Fuzzy Hash: 858e49fdbc7ad71f60e3e61bb678aa7807c3c0f9f15b92687bd0640dc00d2ff8
                            • Instruction Fuzzy Hash: EA31BBB8D102189FCB10CFA9D884ADEFBF4BB49320F14906AE818B7310D734A845CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID: 0-3916222277
                            • Opcode ID: 3c0cfb3d0d7a1f8602921f0a0c5f1998302deb6062c5bda03fbc7baf3f5072ad
                            • Instruction ID: 3aa655a9b5b716fde8922ad9b2a41cdfce8187794f4d4747a0d1828ef0c96b49
                            • Opcode Fuzzy Hash: 3c0cfb3d0d7a1f8602921f0a0c5f1998302deb6062c5bda03fbc7baf3f5072ad
                            • Instruction Fuzzy Hash: DE314C71E016099FDB29CFAAD8446DABBF3AFC9310F14C0BAD544AA265EB3409428F11
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID: 0-3916222277
                            • Opcode ID: 36d09eed268f0e3c6425bc78fa722312e9346846e6a0b0ecbd90967f21f0643d
                            • Instruction ID: a131988cbc9eac56aa3e6297d234cec8033ca076757a236bf44b2aefab0c323d
                            • Opcode Fuzzy Hash: 36d09eed268f0e3c6425bc78fa722312e9346846e6a0b0ecbd90967f21f0643d
                            • Instruction Fuzzy Hash: CB21C675E016199BEB18CFABD8446DEFAF7BFC8300F14C57AD918A6264EB305A418F40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f0e6d95fd05c546173f108c808e8c481750ed8837dc0665d87d367c2c0eb5ea0
                            • Instruction ID: cecb99a68c1813e9a1935b50f1c396a2a8f5e679586e703de21c004b4e6960f0
                            • Opcode Fuzzy Hash: f0e6d95fd05c546173f108c808e8c481750ed8837dc0665d87d367c2c0eb5ea0
                            • Instruction Fuzzy Hash: 58D11674A04268CFDB08CBA9D88499EFBB6FF89348F24C559D915AB31AD730A841CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1003f6dda8efb1a7c0ef6c1582fa757b2fd208a151dae21e88cf6b9ce65df29a
                            • Instruction ID: 811b67b28b0cd4c3702c0cf1ef904067e1789a3db5d299d6ce08420fb7e4f77f
                            • Opcode Fuzzy Hash: 1003f6dda8efb1a7c0ef6c1582fa757b2fd208a151dae21e88cf6b9ce65df29a
                            • Instruction Fuzzy Hash: 40D11870A04268CFDB08CBA9D884A9EFBF6FF89348F24C559D915AB35AD7349841CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ed7cb6e3dfe46443d911b40cd758dbe2ef0c64ec356ec97c2c65eb6fdccaf044
                            • Instruction ID: 259f9042aa4473c1e195d5d2a2724ca5cd394747e02c165b20294c3d5a0a69bc
                            • Opcode Fuzzy Hash: ed7cb6e3dfe46443d911b40cd758dbe2ef0c64ec356ec97c2c65eb6fdccaf044
                            • Instruction Fuzzy Hash: CCA18F34D046528BC725CF7AC4484AEFFB7FF46300B18C95AC8A9AB615D735AD42CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: aa48219f76830b61afdccefa45e66379be06aeb9f4011fac781e8212798dd72e
                            • Instruction ID: 9739c58fb8dfa1620e43b46006f2e742668aac565514439a012d54174f307ad1
                            • Opcode Fuzzy Hash: aa48219f76830b61afdccefa45e66379be06aeb9f4011fac781e8212798dd72e
                            • Instruction Fuzzy Hash: AE513C74E00206DFDB14CFAAC4858AEFBB6FF89311B15C565C909AB259D734E982CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a5df345bc269eff102e3e43ef1ccb67d2bfbdc5ca5a4b38c20f0dc708b668244
                            • Instruction ID: 33db8c581bc17067954c4eeceef62f39c3393b502e198d149e5c2ce9e5909748
                            • Opcode Fuzzy Hash: a5df345bc269eff102e3e43ef1ccb67d2bfbdc5ca5a4b38c20f0dc708b668244
                            • Instruction Fuzzy Hash: 5E51EFB4E102188FDB24CFE9D8847DEFBB6FB49314F14912AE859AB250DB745845CF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1169dbba1ca080aa2883d21e858873489852a75b87398ec6206e5d7b609b5421
                            • Instruction ID: 9ed15c3ad902b3eefce6a5b0597b7f7ab97d9d0e7fe0fc215f3f65ff8d337306
                            • Opcode Fuzzy Hash: 1169dbba1ca080aa2883d21e858873489852a75b87398ec6206e5d7b609b5421
                            • Instruction Fuzzy Hash: 2351F2B4E102189FDB24CFE9D884BDEFBB6BF49304F24852AE855AB251DB749845CF40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d445156d49f357ab289475056d89fb8ee5d1d4fae57d80eee5b0e54130ef6fbd
                            • Instruction ID: 23d0154524648cd3734a1fbef5e109ee1c5b1f31516dfbb3df1da31bfb14067c
                            • Opcode Fuzzy Hash: d445156d49f357ab289475056d89fb8ee5d1d4fae57d80eee5b0e54130ef6fbd
                            • Instruction Fuzzy Hash: 94510FB0E10218CFDB24DFE9C88479EFBB6FB49304F14812AE855AB250DB749845CF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 90144f61d1a655ad0a1cab2d3e8c702325c412c9d6bf7e96c5b0a10129f0cae3
                            • Instruction ID: b17435a00605661be6375f47ac7b0514775ba8d8adb9c8f6e9ab1689f76103fe
                            • Opcode Fuzzy Hash: 90144f61d1a655ad0a1cab2d3e8c702325c412c9d6bf7e96c5b0a10129f0cae3
                            • Instruction Fuzzy Hash: 4A5114B4E102189FDB24DFE9C8847DEFBB6BB49304F248129E855AB250DB745845CF80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 07836f682d806c3c4b00314e7c68e4a20fb50266f0b4afee2bb27cf24f34d17c
                            • Instruction ID: 43afa1bc459954447ac9c1a624b99377cdef920f80916561bb44662f7d7120a6
                            • Opcode Fuzzy Hash: 07836f682d806c3c4b00314e7c68e4a20fb50266f0b4afee2bb27cf24f34d17c
                            • Instruction Fuzzy Hash: FC41E270A1524ADFCB04CFA8D48059EBBF6EF89244F30C8AAC405EB269E7349E01CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 71bafe6d7ee4329ca0c4f9969a0f1065dd2ff5a44d38c71be509c02213a062d8
                            • Instruction ID: f3f28a0963eb41e15d23fa7dc3a99ad9cce46bd13e0cdd69affdba149956e62f
                            • Opcode Fuzzy Hash: 71bafe6d7ee4329ca0c4f9969a0f1065dd2ff5a44d38c71be509c02213a062d8
                            • Instruction Fuzzy Hash: 40414D74E04106DFC704CFA9C4858AEFBB6FF89310B25C955C919AB259D734EA82CF94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 651758db5a522ca45fef4d1a7fe96f0639efe9bd4062e33177c2da3352530fd1
                            • Instruction ID: cc444804ce51f61271be0387d2cc25479326c6b823b352195a20511294bd1c6d
                            • Opcode Fuzzy Hash: 651758db5a522ca45fef4d1a7fe96f0639efe9bd4062e33177c2da3352530fd1
                            • Instruction Fuzzy Hash: FB41E870E0420A8FCB48CFAAD4805AEFBF2BF89750F24C56AC915B7255D7349A42CF95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 53b80c043b13b200f6d974a16fd978b909a4b4c9ead4ac5021fe64e695b2491e
                            • Instruction ID: 11793ee92dbd0b19556ad0ae7b3270e7e72b4b1795f106445ec7470d3707cfee
                            • Opcode Fuzzy Hash: 53b80c043b13b200f6d974a16fd978b909a4b4c9ead4ac5021fe64e695b2491e
                            • Instruction Fuzzy Hash: 6A41E6B0E0420A8FCB44CFAAD4805AEFBB6BB88750F24C569C815B7254D7349A42CF95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 835e57f237be999058b2c09b16a1cee988eaa99d7e2fe182bfdbeb8162527929
                            • Instruction ID: cb720df888da902c071305c8a041aecb61c962c1863acbde903087061d72434e
                            • Opcode Fuzzy Hash: 835e57f237be999058b2c09b16a1cee988eaa99d7e2fe182bfdbeb8162527929
                            • Instruction Fuzzy Hash: 6641DB71D056989FDB19CF6A9C446DABFB3AFC6300F18C0EAD448AB265D7310995CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.454222449.0000000001760000.00000040.00000800.00020000.00000000.sdmp, Offset: 01760000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1760000_DHL_119040 receipt document,pdf.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4e606127ec635b5c3f64e4d7f053be164d6356738a04c428cc5a5750b97ff4ae
                            • Instruction ID: 5a2fabdb99b3f993042e24d77e00987dc92179fe736b3e8dd2b06c8000b05c2b
                            • Opcode Fuzzy Hash: 4e606127ec635b5c3f64e4d7f053be164d6356738a04c428cc5a5750b97ff4ae
                            • Instruction Fuzzy Hash: D2417775E016289BDB68CF6BDD446CEFBF7AFC8300F14C1AA990CA7264DB3159918E40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Execution Graph

                            Execution Coverage:9.3%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:46
                            Total number of Limit Nodes:2
                            execution_graph 18633 4deadd0 18634 4deadee 18633->18634 18637 4de9dc0 18634->18637 18636 4deae25 18638 4dec8f0 LoadLibraryA 18637->18638 18640 4dec9cc 18638->18640 18641 4de4540 18642 4de4554 18641->18642 18645 4de478a 18642->18645 18652 4de485f 18645->18652 18656 4de4870 18645->18656 18660 4de4986 18645->18660 18664 4de49e8 18645->18664 18669 4de496c 18645->18669 18653 4de48b4 18652->18653 18654 4de49ab 18653->18654 18673 4de4c67 18653->18673 18657 4de48b4 18656->18657 18658 4de49ab 18657->18658 18659 4de4c67 2 API calls 18657->18659 18659->18658 18661 4de4999 18660->18661 18662 4de49ab 18660->18662 18663 4de4c67 2 API calls 18661->18663 18663->18662 18665 4de49ee 18664->18665 18686 4de4f1f 18665->18686 18690 4de4f30 18665->18690 18666 4de455d 18670 4de491f 18669->18670 18671 4de49ab 18670->18671 18672 4de4c67 2 API calls 18670->18672 18672->18671 18674 4de4c86 18673->18674 18678 4de4cc8 18674->18678 18682 4de4cb9 18674->18682 18675 4de4c96 18675->18654 18679 4de4d02 18678->18679 18680 4de4d2c RtlEncodePointer 18679->18680 18681 4de4d55 18679->18681 18680->18681 18681->18675 18683 4de4d02 18682->18683 18684 4de4d2c RtlEncodePointer 18683->18684 18685 4de4d55 18683->18685 18684->18685 18685->18675 18687 4de4f2a 18686->18687 18687->18666 18688 4de4fd7 RtlEncodePointer 18687->18688 18689 4de5000 18687->18689 18688->18689 18689->18666 18691 4de4f3e 18690->18691 18691->18666 18692 4de4fd7 RtlEncodePointer 18691->18692 18693 4de5000 18691->18693 18692->18693 18693->18666

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 62 4de9dc0-4dec947 64 4dec949-4dec953 62->64 65 4dec980-4dec9ca LoadLibraryA 62->65 64->65 66 4dec955-4dec957 64->66 72 4dec9cc-4dec9d2 65->72 73 4dec9d3-4deca04 65->73 67 4dec97a-4dec97d 66->67 68 4dec959-4dec963 66->68 67->65 70 4dec967-4dec976 68->70 71 4dec965 68->71 70->70 74 4dec978 70->74 71->70 72->73 77 4deca06-4deca0a 73->77 78 4deca14 73->78 74->67 77->78 79 4deca0c 77->79 80 4deca15 78->80 79->78 80->80
                            APIs
                            • LoadLibraryA.KERNELBASE(?), ref: 04DEC9BA
                            Memory Dump Source
                            • Source File: 00000001.00000002.711017121.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_4de0000_cvtres.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: e6b16cd5c651f145af2a682d2aa817c58a8458618c6590fd90ba7147f517c392
                            • Instruction ID: 57f2199b3de29aa103f3db6550302cd8abf6b0752b0335a4a30d1e0d6eaf0cdf
                            • Opcode Fuzzy Hash: e6b16cd5c651f145af2a682d2aa817c58a8458618c6590fd90ba7147f517c392
                            • Instruction Fuzzy Hash: D23155B1D202499FDB14DFAAC8857AEBBF1BB09714F14852AE816BB380D774A441CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 81 4dec8e4-4dec947 82 4dec949-4dec953 81->82 83 4dec980-4dec9ca LoadLibraryA 81->83 82->83 84 4dec955-4dec957 82->84 90 4dec9cc-4dec9d2 83->90 91 4dec9d3-4deca04 83->91 85 4dec97a-4dec97d 84->85 86 4dec959-4dec963 84->86 85->83 88 4dec967-4dec976 86->88 89 4dec965 86->89 88->88 92 4dec978 88->92 89->88 90->91 95 4deca06-4deca0a 91->95 96 4deca14 91->96 92->85 95->96 97 4deca0c 95->97 98 4deca15 96->98 97->96 98->98
                            APIs
                            • LoadLibraryA.KERNELBASE(?), ref: 04DEC9BA
                            Memory Dump Source
                            • Source File: 00000001.00000002.711017121.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_4de0000_cvtres.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: fcd1b764cd49619de022e746ee12b97efa8943b897d15140f6b14e0eca15899e
                            • Instruction ID: 0df5595c28f6e5b2f4862b29ca10b7b8e6727da617350e95f1468b6f34f1f831
                            • Opcode Fuzzy Hash: fcd1b764cd49619de022e746ee12b97efa8943b897d15140f6b14e0eca15899e
                            • Instruction Fuzzy Hash: 063146B1D102489FDB14DFA9D8857AEBBF1BF09714F14852AE816A7380D774A481CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 718 4de4f1f-4de4f28 719 4de4f8f-4de4fb8 call 4de4da0 call 4de4df8 718->719 720 4de4f2a-4de4f3e call 4de4838 718->720 729 4de4fbe 719->729 730 4de4fba-4de4fbc 719->730 726 4de4f4e-4de4f66 call 4de4a88 720->726 726->719 732 4de4fc3-4de4fcb 729->732 730->732 733 4de4fcd-4de4ffe RtlEncodePointer 732->733 734 4de5027-4de5039 732->734 736 4de5007-4de501d 733->736 737 4de5000-4de5006 733->737 736->734 737->736
                            APIs
                            • RtlEncodePointer.NTDLL(00000000), ref: 04DE4FED
                            Memory Dump Source
                            • Source File: 00000001.00000002.711017121.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_4de0000_cvtres.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID:
                            • API String ID: 2118026453-0
                            • Opcode ID: 913335a87108b95bb5f376ed2bda0a1b959f6402140bb9fdc8d239ab8ba3e8a4
                            • Instruction ID: 2bcd25d4f6dd80b4af0ef35a6be5e3a0935a460247dcbc689ad17843b71d6288
                            • Opcode Fuzzy Hash: 913335a87108b95bb5f376ed2bda0a1b959f6402140bb9fdc8d239ab8ba3e8a4
                            • Instruction Fuzzy Hash: 1A21B0709043849FEB50EFA5E4443AD7BF4FB49318F10451AD488E7241C77DA485CFA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 739 4de4cb9-4de4d0a 742 4de4d0c-4de4d0e 739->742 743 4de4d10 739->743 744 4de4d15-4de4d20 742->744 743->744 745 4de4d22-4de4d53 RtlEncodePointer 744->745 746 4de4d81-4de4d8e 744->746 748 4de4d5c-4de4d7c 745->748 749 4de4d55-4de4d5b 745->749 748->746 749->748
                            APIs
                            • RtlEncodePointer.NTDLL(00000000), ref: 04DE4D42
                            Memory Dump Source
                            • Source File: 00000001.00000002.711017121.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_4de0000_cvtres.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID:
                            • API String ID: 2118026453-0
                            • Opcode ID: c54fd2a8d9cfe7582408c87314bebb337388067a3c506506f8420c9d16ffba36
                            • Instruction ID: e258664c60a68c25d8beb75796e9c2ca3dc6f8c6771bcc66212904b5951d44fe
                            • Opcode Fuzzy Hash: c54fd2a8d9cfe7582408c87314bebb337388067a3c506506f8420c9d16ffba36
                            • Instruction Fuzzy Hash: BA218871901749DFDB50DFA9E5487AEBBF4FB44314F24842AD445E7A40C738A444CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 751 4de4cc8-4de4d0a 754 4de4d0c-4de4d0e 751->754 755 4de4d10 751->755 756 4de4d15-4de4d20 754->756 755->756 757 4de4d22-4de4d53 RtlEncodePointer 756->757 758 4de4d81-4de4d8e 756->758 760 4de4d5c-4de4d7c 757->760 761 4de4d55-4de4d5b 757->761 760->758 761->760
                            APIs
                            • RtlEncodePointer.NTDLL(00000000), ref: 04DE4D42
                            Memory Dump Source
                            • Source File: 00000001.00000002.711017121.0000000004DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DE0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_4de0000_cvtres.jbxd
                            Similarity
                            • API ID: EncodePointer
                            • String ID:
                            • API String ID: 2118026453-0
                            • Opcode ID: 83b1dc27f397c8890029b1a147af55b929326af7b6250fd3d67902a8ec86da96
                            • Instruction ID: f0e524451c7856d591988b8752298cca614d37d33bd87b6a78bb9b31ee45e029
                            • Opcode Fuzzy Hash: 83b1dc27f397c8890029b1a147af55b929326af7b6250fd3d67902a8ec86da96
                            • Instruction Fuzzy Hash: 0E11AC709013499FDB50EFA9E84879EBBF8FB44324F14842AD444E7640C778A484CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1523 957d900-957ddee 1598 957ddf4-957de04 1523->1598 1599 957e340-957e358 1523->1599 1598->1599 1600 957de0a-957de1a 1598->1600 1603 957e313-957e33f 1599->1603 1604 957e35a-957e375 1599->1604 1600->1599 1602 957de20-957de30 1600->1602 1602->1599 1605 957de36-957de46 1602->1605 1606 957e377-957e37c 1604->1606 1607 957e381-957e39f 1604->1607 1605->1599 1608 957de4c-957de5c 1605->1608 1609 957e466-957e46b 1606->1609 1622 957e416-957e422 1607->1622 1623 957e3a1-957e3ab 1607->1623 1608->1599 1610 957de62-957de72 1608->1610 1610->1599 1613 957de78-957de88 1610->1613 1613->1599 1615 957de8e-957de9e 1613->1615 1615->1599 1617 957dea4-957deb4 1615->1617 1617->1599 1618 957deba-957deca 1617->1618 1618->1599 1620 957ded0-957e30e 1618->1620 1620->1603 1629 957e424-957e430 1622->1629 1630 957e439-957e445 1622->1630 1623->1622 1627 957e3ad-957e3b9 1623->1627 1637 957e3de-957e3e1 1627->1637 1638 957e3bb-957e3c6 1627->1638 1629->1630 1639 957e432 1629->1639 1635 957e447-957e453 1630->1635 1636 957e45c-957e45e 1630->1636 1635->1636 1648 957e455-957e45a 1635->1648 1636->1609 1642 957e3e3-957e3ef 1637->1642 1643 957e3f8-957e404 1637->1643 1638->1637 1650 957e3c8-957e3d2 1638->1650 1641 957e434-957e437 1639->1641 1641->1609 1642->1643 1653 957e3f1-957e3f6 1642->1653 1645 957e406-957e40d 1643->1645 1646 957e46c-957e478 1643->1646 1645->1646 1649 957e40f-957e414 1645->1649 1646->1641 1655 957e47a-957e4c8 call 957e631 1646->1655 1648->1609 1649->1609 1650->1637 1658 957e3d4-957e3d9 1650->1658 1653->1609 1663 957e4db 1655->1663 1664 957e4ca-957e4d5 1655->1664 1658->1609 1667 957e4e4-957e4e6 1663->1667 1664->1663 1668 957e55e-957e5b0 1664->1668 1670 957e5b7-957e5fc call 957cf60 1667->1670 1671 957e4ec-957e55b 1667->1671 1668->1670 1688 957e5fe-957e60b 1670->1688 1689 957e60d-957e61b 1670->1689 1696 957e62b-957e62e 1688->1696 1697 957e61d-957e627 1689->1697 1698 957e629 1689->1698 1697->1696 1698->1696
                            Memory Dump Source
                            • Source File: 00000001.00000002.714967221.0000000009570000.00000040.00000800.00020000.00000000.sdmp, Offset: 09570000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_9570000_cvtres.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 21d7c843b8b928c0be9497ac9edf67a6fc61106443e984acc3faa2b2e2b7fd8f
                            • Instruction ID: 8c2de0b9523e697e986ddde3cf2473d603302f06c3b37c62998d8778304bdc16
                            • Opcode Fuzzy Hash: 21d7c843b8b928c0be9497ac9edf67a6fc61106443e984acc3faa2b2e2b7fd8f
                            • Instruction Fuzzy Hash: 4C726134A0421C9FEB249FA0D850BDEB7BBEF89308F1084A9D506AB794DF349D459F91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.714967221.0000000009570000.00000040.00000800.00020000.00000000.sdmp, Offset: 09570000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_9570000_cvtres.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7afc0f45478746182df393d5f8e022bf4fe413f755779b217451d8d0b66ca317
                            • Instruction ID: 35c88611fae16e0181c6a17a250ac3140d85807a54f6b963e9874ea9ae9d9ca1
                            • Opcode Fuzzy Hash: 7afc0f45478746182df393d5f8e022bf4fe413f755779b217451d8d0b66ca317
                            • Instruction Fuzzy Hash: 80D1E875A103159FCB14CF69E9899ADB7F6BF88310B1A80A9E406EB371DB30ED45CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.714967221.0000000009570000.00000040.00000800.00020000.00000000.sdmp, Offset: 09570000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_9570000_cvtres.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9e26048d85348bfd890ccd05b994a83bd0dff783149f5ff1054d96a3164cfa53
                            • Instruction ID: 5d2924720f8ae55ce1affd6e784d22b91dbd9b360d9d88bb7c22c19dfd06a9fe
                            • Opcode Fuzzy Hash: 9e26048d85348bfd890ccd05b994a83bd0dff783149f5ff1054d96a3164cfa53
                            • Instruction Fuzzy Hash: 32C1E575A003599FCB04CFA9E9899ADBBF6BF88310B168099E415EB371C734ED45CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.709855382.0000000004BAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BAD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_4bad000_cvtres.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8ab841caf438d890ced888e7904a57263113e2002ef649de8c82274adef08d13
                            • Instruction ID: 3722a8b652f27d19caedefed6242cdb9fbc45218ca779e64437b439541ef751d
                            • Opcode Fuzzy Hash: 8ab841caf438d890ced888e7904a57263113e2002ef649de8c82274adef08d13
                            • Instruction Fuzzy Hash: 4C213DB5508304DFDB00DF54D4C0B66BB6BFB84324F24C9A9D8090BA06C736F466CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.709855382.0000000004BAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BAD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_4bad000_cvtres.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2bca0ad09de3de1b329978a476ab684825861e06981107cc4287498fc74b5113
                            • Instruction ID: ccd1d4bef29118be310f78c1125f0299263b5c893f1f460d3b1b53854fed833c
                            • Opcode Fuzzy Hash: 2bca0ad09de3de1b329978a476ab684825861e06981107cc4287498fc74b5113
                            • Instruction Fuzzy Hash: 77214FB5608304DFDB04CF54D5C4F56BF6AFB88318F2485A9D8050B616C336E865DBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.714967221.0000000009570000.00000040.00000800.00020000.00000000.sdmp, Offset: 09570000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_9570000_cvtres.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5d1f35a7a4e9769bec8d6d43915eff7a02dd04b54da868c2b06d0c500ce2a68b
                            • Instruction ID: 3b2af1ddceb354888ae3d24301229c9bc53b0c9f1c994e0d198f0f6bc6338d71
                            • Opcode Fuzzy Hash: 5d1f35a7a4e9769bec8d6d43915eff7a02dd04b54da868c2b06d0c500ce2a68b
                            • Instruction Fuzzy Hash: 1A21C535601219AFDB18DF65E994EADB7B2FF48700F114558F8019B362DB70EE44CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.709855382.0000000004BAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BAD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_4bad000_cvtres.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 14d24104e7c3173a843a0472e1518ad77889c4c6c77b39ebf8477dc8966a5350
                            • Instruction ID: 75fc404d28d80391fd841785d411fcceae57499f208533389ce8297e3ca581d3
                            • Opcode Fuzzy Hash: 14d24104e7c3173a843a0472e1518ad77889c4c6c77b39ebf8477dc8966a5350
                            • Instruction Fuzzy Hash: 5C11D376404280DFCB11CF14D5C4B56BF72FB84320F24C6A9D8084BA56C33AE46ACBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.709855382.0000000004BAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BAD000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_4bad000_cvtres.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 14d24104e7c3173a843a0472e1518ad77889c4c6c77b39ebf8477dc8966a5350
                            • Instruction ID: 6840f1b116a0a62231138312cf0cc8f4b3a8b29fe96f51c065f43c2a4477cf4a
                            • Opcode Fuzzy Hash: 14d24104e7c3173a843a0472e1518ad77889c4c6c77b39ebf8477dc8966a5350
                            • Instruction Fuzzy Hash: 2311D376504280CFCB11CF10D5C4B16BF72FB84324F2486A9D8090B656C33AE46ACBA1
                            Uniqueness

                            Uniqueness Score: -1.00%