Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
shipmentReceipt(22kb).pdf__customInvoice12074408.exe

Overview

General Information

Sample Name:shipmentReceipt(22kb).pdf__customInvoice12074408.exe
Analysis ID:876162
MD5:278d48d9ea2fe8350796279e5d08a72a
SHA1:30a693e39b775de6afbd146722d07bba0e4f16bf
SHA256:53823b0378b9a17181fef455b3625e7909e703d600b480ffccc9a1c6d4232c4a
Tags:exe
Infos:

Detection

AgentTesla, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected zgRAT
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Binary contains a suspicious time stamp
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • kmk.exe (PID: 2400 cmdline: "C:\Users\user\AppData\Roaming\kmk\kmk.exe" MD5: 278D48D9EA2FE8350796279E5D08A72A)
    • kmk.exe (PID: 4588 cmdline: C:\Users\user\AppData\Roaming\kmk\kmk.exe MD5: 278D48D9EA2FE8350796279E5D08A72A)
  • kmk.exe (PID: 3276 cmdline: "C:\Users\user\AppData\Roaming\kmk\kmk.exe" MD5: 278D48D9EA2FE8350796279E5D08A72A)
  • cleanup
{"C2 url": "https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendDocumentsendMessage?chat_id=document"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.799586620.0000000000430000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
  • 0x1696:$a11: get_securityProfile
  • 0x1537:$a12: get_useSeparateFolderTree
  • 0x1946:$a14: get_archivingScope
  • 0x176e:$a15: get_providerName
  • 0x12fd:$a20: get_LastAccessed
  • 0x19e0:$a21: get_avatarType
  • 0x17eb:$a26: set_accountName
  • 0xc94:$a28: set_bindingConfigurationUID
  • 0x1846:$a31: set_username
  • 0x13e8:$a33: get_Clipboard
  • 0x13f6:$a34: get_Keyboard
  • 0x1403:$a37: get_Password
00000005.00000002.804401224.0000000003012000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.804401224.0000000003012000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Click to see the 30 entries
          SourceRuleDescriptionAuthorStrings
          0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x2e600:$s1: get_kbok
              • 0x2ef34:$s2: get_CHoo
              • 0x2fb8f:$s3: set_passwordIsSet
              • 0x2e404:$s4: get_enableLog
              • 0x32b27:$s8: torbrowser
              • 0x3150a:$s10: logins
              • 0x30dd8:$s11: credential
              • 0x2d7e8:$g1: get_Clipboard
              • 0x2d7f6:$g2: get_Keyboard
              • 0x2d803:$g3: get_Password
              • 0x2ede2:$g4: get_CtrlKeyDown
              • 0x2edf2:$g5: get_ShiftKeyDown
              • 0x2ee03:$g6: get_AltKeyDown
              0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x2eb45:$a3: MailAccountConfiguration
              • 0x2eb5e:$a5: SmtpAccountConfiguration
              • 0x2eb25:$a8: set_BindingAccountConfiguration
              • 0x2da96:$a11: get_securityProfile
              • 0x2d937:$a12: get_useSeparateFolderTree
              • 0x2f288:$a13: get_DnsResolver
              • 0x2dd46:$a14: get_archivingScope
              • 0x2db6e:$a15: get_providerName
              • 0x30273:$a17: get_priority
              • 0x2f847:$a18: get_advancedParameters
              • 0x2ec5f:$a19: get_disabledByRestriction
              • 0x2d6fd:$a20: get_LastAccessed
              • 0x2dde0:$a21: get_avatarType
              • 0x2f95e:$a22: get_signaturePresets
              • 0x2e404:$a23: get_enableLog
              • 0x2dbeb:$a26: set_accountName
              • 0x2fda9:$a27: set_InternalServerPort
              • 0x2d094:$a28: set_bindingConfigurationUID
              • 0x2f924:$a29: set_IdnAddress
              • 0x30127:$a30: set_GuidMasterKey
              • 0x2dc46:$a31: set_username
              0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 48 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendDocumentsendMessage?chat_id=document"}
                Source: kmk.exe.4588.7.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendMessage"}
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeReversingLabs: Detection: 16%
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeVirustotal: Detection: 27%Perma Link
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeAvira: detection malicious, Label: HEUR/AGEN.1309734
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeReversingLabs: Detection: 16%
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeJoe Sandbox ML: detected
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: mOdw.pdb source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, kmk.exe.5.dr
                Source: Binary string: mOdw.pdbSHA256 source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, kmk.exe.5.dr
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 4x nop then jmp 07FD925Bh0_2_07FD86A0

                Networking

                barindex
                Source: Yara matchFile source: 6.2.kmk.exe.3cbb920.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3c86100.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3c4c6e0.5.raw.unpack, type: UNPACKEDPE
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: kmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                Source: kmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://UZQtUP.com
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.538649666.00000000064EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.wikiphD
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539693492.00000000064E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comams/R
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539693492.00000000064E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comdol
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539693492.00000000064E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comes
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539693492.00000000064E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.comg
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.547482112.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.547482112.00000000064E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comdia
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.553540335.00000000064E4000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.547482112.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.553420022.00000000064E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commTTF
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.547482112.00000000064E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.commpKF
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn(
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539230782.00000000064EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/uG
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnN
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnr-t
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnsk
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/.Kp
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp//r$
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/CK
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/Sue
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/fK(
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/jp/%Ki
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/oK?
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/on
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/yKM
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.799586439.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendDocumentdocument-----
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.799586439.0000000000436000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeJump to behavior
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.565506875.00000000015DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                System Summary

                barindex
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.2.kmk.exe.3cbb920.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.2.kmk.exe.3cbb920.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 7.2.kmk.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.2.kmk.exe.3cbb920.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.2.kmk.exe.3cbb920.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.2.kmk.exe.3c86100.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.2.kmk.exe.3c86100.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.2.kmk.exe.3c86100.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.2.kmk.exe.3c86100.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 6.2.kmk.exe.3c4c6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 6.2.kmk.exe.3c4c6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000005.00000002.799586620.0000000000430000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000007.00000002.799586439.0000000000432000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6492, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6764, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6764, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: kmk.exe PID: 2400, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: kmk.exe PID: 4588, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: Process Memory Space: kmk.exe PID: 4588, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: initial sampleStatic PE information: Filename: shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: initial sampleStatic PE information: Filename: shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 6.2.kmk.exe.3cbb920.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.2.kmk.exe.3cbb920.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 7.2.kmk.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 6.2.kmk.exe.3cbb920.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.2.kmk.exe.3cbb920.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 6.2.kmk.exe.3c86100.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.2.kmk.exe.3c86100.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 6.2.kmk.exe.3c86100.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.2.kmk.exe.3c86100.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 6.2.kmk.exe.3c4c6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 6.2.kmk.exe.3c4c6e0.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000005.00000002.799586620.0000000000430000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000007.00000002.799586439.0000000000432000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6492, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6764, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6764, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: kmk.exe PID: 2400, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: kmk.exe PID: 4588, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: Process Memory Space: kmk.exe PID: 4588, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_0317B4400_2_0317B440
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065E77F00_2_065E77F0
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065E47960_2_065E4796
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065E45180_2_065E4518
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065EA5280_2_065EA528
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065E83600_2_065E8360
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065E77E00_2_065E77E0
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065EA5180_2_065EA518
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065ED5170_2_065ED517
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065E45090_2_065E4509
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065E83510_2_065E8351
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065ECE710_2_065ECE71
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065E7F790_2_065E7F79
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065E7F880_2_065E7F88
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065EEA000_2_065EEA00
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_065EF8280_2_065EF828
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_07FD86A00_2_07FD86A0
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_07FDA4680_2_07FDA468
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_07FD86900_2_07FD8690
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_07FD19B80_2_07FD19B8
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_07FD00400_2_07FD0040
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D7B0585_2_00D7B058
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D762205_2_00D76220
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D970305_2_00D97030
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D911705_2_00D91170
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D9C2E85_2_00D9C2E8
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D912505_2_00D91250
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D9A5185_2_00D9A518
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D9DAA85_2_00D9DAA8
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D983805_2_00D98380
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D965FF5_2_00D965FF
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D965895_2_00D96589
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D965B95_2_00D965B9
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D965B05_2_00D965B0
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D9655F5_2_00D9655F
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D965685_2_00D96568
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_013556F85_2_013556F8
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_01352BF85_2_01352BF8
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_01354AC15_2_01354AC1
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_01355E305_2_01355E30
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_0135E1E85_2_0135E1E8
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_013595F65_2_013595F6
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_0135CE185_2_0135CE18
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_014946E05_2_014946E0
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_014945F05_2_014945F0
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_0149DA415_2_0149DA41
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeCode function: 6_2_02A3B4406_2_02A3B440
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeCode function: 6_2_05B4C2D06_2_05B4C2D0
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeCode function: 6_2_05B48CAC6_2_05B48CAC
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeCode function: 6_2_05B4C6976_2_05B4C697
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeCode function: 6_2_05C7318C6_2_05C7318C
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeCode function: 6_2_05C7A3206_2_05C7A320
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeCode function: 6_2_05B500066_2_05B50006
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeCode function: 6_2_05B500406_2_05B50040
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000000.533329782.0000000000E52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemOdw.exe< vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.579322003.0000000009E10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.565506875.00000000015DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.567910784.00000000032DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJxIIaRUTvaLxexPWTLbbe.exe4 vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJxIIaRUTvaLxexPWTLbbe.exe4 vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameRegive.dll4 vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.534648107.000000000162D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.799586620.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJxIIaRUTvaLxexPWTLbbe.exe4 vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.801240956.000000000125A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.800819168.00000000010F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeBinary or memory string: OriginalFilenamemOdw.exe< vs shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: kmk.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeReversingLabs: Detection: 16%
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeVirustotal: Detection: 27%
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeFile read: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeJump to behavior
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\kmk\kmk.exe "C:\Users\user\AppData\Roaming\kmk\kmk.exe"
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess created: C:\Users\user\AppData\Roaming\kmk\kmk.exe C:\Users\user\AppData\Roaming\kmk\kmk.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\kmk\kmk.exe "C:\Users\user\AppData\Roaming\kmk\kmk.exe"
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess created: C:\Users\user\AppData\Roaming\kmk\kmk.exe C:\Users\user\AppData\Roaming\kmk\kmk.exeJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\shipmentReceipt(22kb).pdf__customInvoice12074408.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/4@0/0
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.804401224.000000000303E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeMutant created: \Sessions\1\BaseNamedObjects\XQpCtCOJSxKgTAA
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: mOdw.pdb source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, kmk.exe.5.dr
                Source: Binary string: mOdw.pdbSHA256 source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, kmk.exe.5.dr

                Data Obfuscation

                barindex
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exe, frmPizzaProj.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.e50000.0.unpack, frmPizzaProj.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: kmk.exe.5.dr, frmPizzaProj.cs.Net Code: InitializeComponent System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 0_2_07FD5799 push eax; ret 0_2_07FD579C
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D9598B push 8BFFFFFFh; retf 5_2_00D95998
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_013589A8 push ds; retf 5_2_013589AF
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_0135AB17 push edi; retn 0000h5_2_0135AB19
                Source: shipmentReceipt(22kb).pdf__customInvoice12074408.exeStatic PE information: 0xB67E188C [Sat Jan 8 12:58:52 2067 UTC]
                Source: initial sampleStatic PE information: section name: .text entropy: 7.743534616199072
                Source: initial sampleStatic PE information: section name: .text entropy: 7.743534616199072
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeFile created: C:\Users\user\AppData\Roaming\kmk\kmk.exeJump to dropped file
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kmkJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run kmkJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeFile opened: C:\Users\user\AppData\Roaming\kmk\kmk.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe TID: 6488Thread sleep time: -41202s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe TID: 5472Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe TID: 7068Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe TID: 6840Thread sleep count: 9847 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exe TID: 4092Thread sleep time: -41202s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exe TID: 5708Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exe TID: 4544Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exe TID: 6972Thread sleep time: -27670116110564310s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exe TID: 6960Thread sleep count: 9850 > 30Jump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeWindow / User API: threadDelayed 9847Jump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeWindow / User API: threadDelayed 9850Jump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeThread delayed: delay time: 41202Jump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeThread delayed: delay time: 41202Jump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeCode function: 5_2_00D9D818 LdrInitializeThunk,5_2_00D9D818
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeMemory written: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeMemory written: C:\Users\user\AppData\Roaming\kmk\kmk.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeProcess created: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeProcess created: C:\Users\user\AppData\Roaming\kmk\kmk.exe C:\Users\user\AppData\Roaming\kmk\kmk.exeJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Users\user\AppData\Roaming\kmk\kmk.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Users\user\AppData\Roaming\kmk\kmk.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Users\user\AppData\Roaming\kmk\kmk.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\kmk\kmk.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: kmk.exe PID: 4588, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3cbb920.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3cbb920.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3c86100.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3c86100.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3c4c6e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.804401224.0000000003012000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6492, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: kmk.exe PID: 2400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: kmk.exe PID: 4588, type: MEMORYSTR
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 00000005.00000002.804401224.0000000003012000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: kmk.exe PID: 4588, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: kmk.exe PID: 4588, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3cbb920.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3cbb920.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3c86100.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.4462548.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3c86100.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.449bf68.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.shipmentReceipt(22kb).pdf__customInvoice12074408.exe.44d1788.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.kmk.exe.3c4c6e0.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.804401224.0000000003012000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6492, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: shipmentReceipt(22kb).pdf__customInvoice12074408.exe PID: 6764, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: kmk.exe PID: 2400, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: kmk.exe PID: 4588, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts121
                Windows Management Instrumentation
                1
                Registry Run Keys / Startup Folder
                111
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                21
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                Registry Run Keys / Startup Folder
                1
                Disable or Modify Tools
                111
                Input Capture
                1
                Process Discovery
                Remote Desktop Protocol111
                Input Capture
                Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                Virtualization/Sandbox Evasion
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Archive Collected Data
                Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object Model1
                Data from Local System
                Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Hidden Files and Directories
                LSA Secrets24
                System Information Discovery
                SSH1
                Clipboard Data
                Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common3
                Obfuscated Files or Information
                Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items12
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Timestomp
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 876162 Sample: shipmentReceipt(22kb).pdf__... Startdate: 26/05/2023 Architecture: WINDOWS Score: 100 30 Found malware configuration 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus / Scanner detection for submitted sample 2->34 36 8 other signatures 2->36 6 shipmentReceipt(22kb).pdf__customInvoice12074408.exe 3 2->6         started        10 kmk.exe 3 2->10         started        12 kmk.exe 2 2->12         started        process3 file4 24 shipmentReceipt(22...ice12074408.exe.log, ASCII 6->24 dropped 38 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->38 40 Injects a PE file into a foreign processes 6->40 14 shipmentReceipt(22kb).pdf__customInvoice12074408.exe 2 5 6->14         started        18 shipmentReceipt(22kb).pdf__customInvoice12074408.exe 6->18         started        20 shipmentReceipt(22kb).pdf__customInvoice12074408.exe 6->20         started        42 Antivirus detection for dropped file 10->42 44 Multi AV Scanner detection for dropped file 10->44 46 Machine Learning detection for dropped file 10->46 22 kmk.exe 2 10->22         started        signatures5 process6 file7 26 C:\Users\user\AppData\Roaming\kmk\kmk.exe, PE32 14->26 dropped 28 C:\Users\user\...\kmk.exe:Zone.Identifier, ASCII 14->28 dropped 48 Tries to steal Mail credentials (via file / registry access) 14->48 50 Tries to harvest and steal browser information (history, passwords, etc) 14->50 52 Hides that the sample has been downloaded from the Internet (zone.identifier) 14->52 54 Installs a global keyboard hook 14->54 signatures8

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                shipmentReceipt(22kb).pdf__customInvoice12074408.exe17%ReversingLabsByteCode-MSIL.Trojan.Generic
                shipmentReceipt(22kb).pdf__customInvoice12074408.exe27%VirustotalBrowse
                shipmentReceipt(22kb).pdf__customInvoice12074408.exe100%AviraHEUR/AGEN.1309734
                shipmentReceipt(22kb).pdf__customInvoice12074408.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\kmk\kmk.exe100%AviraHEUR/AGEN.1309734
                C:\Users\user\AppData\Roaming\kmk\kmk.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\kmk\kmk.exe17%ReversingLabsByteCode-MSIL.Trojan.Generic
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.founder.com.cn/cnN0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.carterandcone.comes0%URL Reputationsafe
                http://www.carterandcone.comdol0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.fontbureau.comdia0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cnr-t0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                http://DynDns.comDynDNS0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/jp/0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/on0%URL Reputationsafe
                http://www.carterandcone.comg0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/Sue0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.founder.com.cn/cn(0%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://www.fontbureau.commpKF0%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/uG0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp//r$0%Avira URL Cloudsafe
                http://en.wikiphD0%Avira URL Cloudsafe
                http://UZQtUP.com0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/CK0%Avira URL Cloudsafe
                http://www.carterandcone.comams/R0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp//r$0%VirustotalBrowse
                http://www.fontbureau.commTTF0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/.Kp0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/yKM0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/oK?0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/fK(0%Avira URL Cloudsafe
                http://www.founder.com.cn/cnsk0%Avira URL Cloudsafe
                http://www.jiyu-kobo.co.jp/jp/%Ki0%Avira URL Cloudsafe
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.founder.com.cn/cnNshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://127.0.0.1:HTTP/1.1shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://www.fontbureau.com/designersGshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.commpKFshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.547482112.00000000064E3000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cn/uGshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539230782.00000000064EC000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.carterandcone.comesshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539693492.00000000064E3000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://UZQtUP.comkmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.carterandcone.comdolshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539693492.00000000064E3000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.jiyu-kobo.co.jp//r$shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designersshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://en.wikiphDshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.538649666.00000000064EE000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.sajatypeworks.comshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.comdiashipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.547482112.00000000064E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.founder.com.cn/cn/cTheshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.jiyu-kobo.co.jp/CKshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://fontfabrik.comshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comams/RshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539693492.00000000064E3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.founder.com.cn/cnr-tshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/DPleaseshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fonts.comshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.sandoll.co.krshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.urwpp.deDPleaseshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.zhongyicts.com.cnshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sakkal.comshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.commTTFshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.553540335.00000000064E4000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.547482112.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.553420022.00000000064E3000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/sendDocumentdocument-----shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.799586439.0000000000436000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.547482112.00000000064E3000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://DynDns.comDynDNSkmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%hashipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/.KpshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/yKMshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/jp/shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/onshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comgshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539693492.00000000064E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/SueshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.jiyu-kobo.co.jp/fK(shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cnshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-user.htmlshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/sshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/jp/%KishipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.jiyu-kobo.co.jp/shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540333707.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.577848847.0000000007632000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnskshipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://www.founder.com.cn/cn(shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.539103728.00000000064EC000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://api.telegram.org/bot1360033246:AAF6H8m6YrL09doyxtsvJzZ_cIl__BCF4aU/shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, kmk.exe, 00000007.00000002.799586439.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalse
                                        high
                                        http://www.jiyu-kobo.co.jp/oK?shipmentReceipt(22kb).pdf__customInvoice12074408.exe, 00000000.00000003.540184473.00000000064E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        No contacted IP infos
                                        Joe Sandbox Version:37.1.0 Beryl
                                        Analysis ID:876162
                                        Start date and time:2023-05-26 11:39:13 +02:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 9m 52s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:9
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample file name:shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@11/4@0/0
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HDC Information:Failed
                                        HCA Information:
                                        • Successful, ratio: 98%
                                        • Number of executed functions: 143
                                        • Number of non-executed functions: 12
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe
                                        • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        TimeTypeDescription
                                        11:40:15API Interceptor698x Sleep call for process: shipmentReceipt(22kb).pdf__customInvoice12074408.exe modified
                                        11:40:42AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kmk C:\Users\user\AppData\Roaming\kmk\kmk.exe
                                        11:40:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kmk C:\Users\user\AppData\Roaming\kmk\kmk.exe
                                        11:40:56API Interceptor400x Sleep call for process: kmk.exe modified
                                        No context
                                        No context
                                        No context
                                        No context
                                        No context
                                        Process:C:\Users\user\AppData\Roaming\kmk\kmk.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1302
                                        Entropy (8bit):5.3499841584777394
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4K5AE4Kzr7RKDE4KhK3VZ9pKhPKIE4oKFKHKorE4x84j:MIHK5HKXE1qHbHK5AHKzvRYHKhQnoPtW
                                        MD5:E2C3A19FF3EBB1649BF9F41DFE3B7E8F
                                        SHA1:5DA8AB9561D3C096BB9103413F64EE6E50D5AD88
                                        SHA-256:18E921771341555EF6167DEBBD7C83727518897E9B4B3545B7CCDB48E2043B74
                                        SHA-512:6B62A68EC358699D55E4CCD0BBDD4ADDC0F38641D82A019697893CEB503E853A5F087FAF9F4408425AD6631C9CBA31C3354FD98B45F051F2F59A0ECC3CA2FA06
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assem
                                        Process:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1302
                                        Entropy (8bit):5.3499841584777394
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4Ks2E1qE4bE4K5AE4Kzr7RKDE4KhK3VZ9pKhPKIE4oKFKHKorE4x84j:MIHK5HKXE1qHbHK5AHKzvRYHKhQnoPtW
                                        MD5:E2C3A19FF3EBB1649BF9F41DFE3B7E8F
                                        SHA1:5DA8AB9561D3C096BB9103413F64EE6E50D5AD88
                                        SHA-256:18E921771341555EF6167DEBBD7C83727518897E9B4B3545B7CCDB48E2043B74
                                        SHA-512:6B62A68EC358699D55E4CCD0BBDD4ADDC0F38641D82A019697893CEB503E853A5F087FAF9F4408425AD6631C9CBA31C3354FD98B45F051F2F59A0ECC3CA2FA06
                                        Malicious:true
                                        Reputation:moderate, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assem
                                        Process:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):740864
                                        Entropy (8bit):7.721307853882747
                                        Encrypted:false
                                        SSDEEP:12288:1KK7z5GoJiGaq5aub+2QsKn/KOOfyXuKMu+h3pLGU+arbVifvHehJes:z5GoR5aa+jHOA4h/+cVifvH8
                                        MD5:278D48D9EA2FE8350796279E5D08A72A
                                        SHA1:30A693E39B775DE6AFBD146722D07BBA0E4F16BF
                                        SHA-256:53823B0378B9A17181FEF455B3625E7909E703D600B480FFCCC9A1C6D4232C4A
                                        SHA-512:2522BBD936BCE6A0849892FE5C49850C74C0BECEA7567D21E27C0B8A314C29E44BBCB20B5D6E6AD8B44D0009A4304A4C64A8C935BD2284BD98931FABA93B324D
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Avira, Detection: 100%
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 17%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....~...............0..2...........Q... ...`....@.. ....................................@.................................BQ..O....`...............................0..p............................................ ............... ..H............text....1... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............L..............@..B................vQ......H.......T...l^......m........8..........................................^..}.....(.......(.....*&..(.....*&..(.....*.0..+.........,..{.......+....,...{....o........(.....*..0............s....}......{....s....}.....(......{.....o......{.... ....o......{...........s....o......"...@"..PAs....( ......(!......o"..... .... ....s#...($......o%.....r...p(&.....r...po'............s....((......()....*".(*....*".(*....*.0............{.....+..*&...}....*...0............{.....+..*&...}...
                                        Process:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:modified
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.721307853882747
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        File size:740864
                                        MD5:278d48d9ea2fe8350796279e5d08a72a
                                        SHA1:30a693e39b775de6afbd146722d07bba0e4f16bf
                                        SHA256:53823b0378b9a17181fef455b3625e7909e703d600b480ffccc9a1c6d4232c4a
                                        SHA512:2522bbd936bce6a0849892fe5c49850c74c0becea7567d21e27c0b8a314c29e44bbcb20b5d6e6ad8b44d0009a4304a4c64a8c935bd2284bd98931faba93b324d
                                        SSDEEP:12288:1KK7z5GoJiGaq5aub+2QsKn/KOOfyXuKMu+h3pLGU+arbVifvHehJes:z5GoR5aa+jHOA4h/+cVifvH8
                                        TLSH:28F4028472A98B07F1BA3BF552429AB017F6BD67B070E20A0DD233DF5AB1F049651B47
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....~...............0..2...........Q... ...`....@.. ....................................@................................
                                        Icon Hash:05292b2323232b00
                                        Entrypoint:0x4b5196
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0xB67E188C [Sat Jan 8 12:58:52 2067 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xb51420x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xb60000x1710.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xb80000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb30b80x70.text
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xb319c0xb3200False0.9080273028611305data7.743534616199072IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0xb60000x17100x1800False0.2373046875data3.7239302603938516IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xb80000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountry
                                        RT_ICON0xb61300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
                                        RT_GROUP_ICON0xb71d80x14data
                                        RT_VERSION0xb71ec0x338data
                                        RT_MANIFEST0xb75240x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        No network behavior found

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:11:40:05
                                        Start date:26/05/2023
                                        Path:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        Imagebase:0xe50000
                                        File size:740864 bytes
                                        MD5 hash:278D48D9EA2FE8350796279E5D08A72A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.573264210.0000000004D80000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.573264210.0000000004462000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low

                                        Target ID:3
                                        Start time:11:40:17
                                        Start date:26/05/2023
                                        Path:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        Imagebase:0x80000
                                        File size:740864 bytes
                                        MD5 hash:278D48D9EA2FE8350796279E5D08A72A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        Target ID:4
                                        Start time:11:40:17
                                        Start date:26/05/2023
                                        Path:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        Imagebase:0x130000
                                        File size:740864 bytes
                                        MD5 hash:278D48D9EA2FE8350796279E5D08A72A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low

                                        Target ID:5
                                        Start time:11:40:17
                                        Start date:26/05/2023
                                        Path:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\Desktop\shipmentReceipt(22kb).pdf__customInvoice12074408.exe
                                        Imagebase:0xbc0000
                                        File size:740864 bytes
                                        MD5 hash:278D48D9EA2FE8350796279E5D08A72A
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000005.00000002.799586620.0000000000430000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.804401224.0000000003012000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.804401224.0000000003012000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000005.00000002.804401224.0000000002F51000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                        Reputation:low

                                        Target ID:6
                                        Start time:11:40:50
                                        Start date:26/05/2023
                                        Path:C:\Users\user\AppData\Roaming\kmk\kmk.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\kmk\kmk.exe"
                                        Imagebase:0x560000
                                        File size:740864 bytes
                                        MD5 hash:278D48D9EA2FE8350796279E5D08A72A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000006.00000002.658231003.0000000003C4C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Antivirus matches:
                                        • Detection: 100%, Avira
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 17%, ReversingLabs
                                        Reputation:low

                                        Target ID:7
                                        Start time:11:40:58
                                        Start date:26/05/2023
                                        Path:C:\Users\user\AppData\Roaming\kmk\kmk.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Users\user\AppData\Roaming\kmk\kmk.exe
                                        Imagebase:0x8d0000
                                        File size:740864 bytes
                                        MD5 hash:278D48D9EA2FE8350796279E5D08A72A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Yara matches:
                                        • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000007.00000002.799586439.0000000000432000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000007.00000002.803741749.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                        Reputation:low

                                        Target ID:8
                                        Start time:11:40:59
                                        Start date:26/05/2023
                                        Path:C:\Users\user\AppData\Roaming\kmk\kmk.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\kmk\kmk.exe"
                                        Imagebase:0xa60000
                                        File size:740864 bytes
                                        MD5 hash:278D48D9EA2FE8350796279E5D08A72A
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:.Net C# or VB.NET
                                        Reputation:low

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:13.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:20.4%
                                          Total number of Nodes:235
                                          Total number of Limit Nodes:9
                                          execution_graph 28189 317e7b0 28190 317e7c4 28189->28190 28192 317e7e9 28190->28192 28193 317d8a8 28190->28193 28194 317e970 LoadLibraryExW 28193->28194 28196 317e9e9 28194->28196 28196->28192 28267 31770a0 28268 31770b4 28267->28268 28269 31770bd 28268->28269 28271 31772da 28268->28271 28278 31774d6 28271->28278 28282 3177538 28271->28282 28287 31774bc 28271->28287 28291 31773c0 28271->28291 28295 31773b0 28271->28295 28279 31774fb 28278->28279 28280 31774e9 28278->28280 28299 3177bb8 28280->28299 28283 317753e 28282->28283 28312 3177e80 28283->28312 28316 3177e6f 28283->28316 28284 31772e3 28284->28269 28288 317746f 28287->28288 28289 31774fb 28288->28289 28290 3177bb8 2 API calls 28288->28290 28290->28289 28292 31773c1 28291->28292 28293 31774fb 28292->28293 28294 3177bb8 2 API calls 28292->28294 28294->28293 28296 31773b8 28295->28296 28297 31774fb 28296->28297 28298 3177bb8 2 API calls 28296->28298 28298->28297 28300 3177bbc 28299->28300 28304 3177c18 28300->28304 28308 3177c08 28300->28308 28301 3177be6 28301->28279 28305 3177c52 28304->28305 28306 3177ca5 28305->28306 28307 3177c7c RtlEncodePointer 28305->28307 28306->28301 28307->28306 28309 3177c18 28308->28309 28310 3177c7c RtlEncodePointer 28309->28310 28311 3177ca5 28309->28311 28310->28311 28311->28301 28313 3177e8e 28312->28313 28320 3177eb8 28313->28320 28314 3177e9e 28314->28284 28317 3177e8e 28316->28317 28319 3177eb8 RtlEncodePointer 28317->28319 28318 3177e9e 28318->28284 28319->28318 28321 3177f01 28320->28321 28322 3177f27 RtlEncodePointer 28321->28322 28323 3177f50 28321->28323 28322->28323 28323->28314 28033 7fd0d20 28034 7fd0d3c 28033->28034 28035 7fd10bb 28034->28035 28038 7fd8349 28034->28038 28044 7fd8358 28034->28044 28039 7fd8372 28038->28039 28050 7fd91cb 28039->28050 28079 7fd8690 28039->28079 28108 7fd86a0 28039->28108 28040 7fd8396 28040->28035 28045 7fd8372 28044->28045 28047 7fd91cb 12 API calls 28045->28047 28048 7fd86a0 12 API calls 28045->28048 28049 7fd8690 12 API calls 28045->28049 28046 7fd8396 28046->28035 28047->28046 28048->28046 28049->28046 28051 7fd878a 28050->28051 28060 7fd910f 28051->28060 28137 7fd095d 28051->28137 28141 7fd0968 28051->28141 28052 7fd8895 28053 7fd89d9 28052->28053 28077 65efcc8 SetThreadContext 28052->28077 28078 65efcc0 SetThreadContext 28052->28078 28067 7fd0769 ReadProcessMemory 28053->28067 28068 7fd0770 ReadProcessMemory 28053->28068 28054 7fd8aca 28065 7fd0558 VirtualAllocEx 28054->28065 28066 7fd0560 VirtualAllocEx 28054->28066 28055 7fd8c18 28071 7fd0648 WriteProcessMemory 28055->28071 28072 7fd0650 WriteProcessMemory 28055->28072 28056 7fd8edb 28069 7fd0648 WriteProcessMemory 28056->28069 28070 7fd0650 WriteProcessMemory 28056->28070 28057 7fd8f3a 28059 7fd904b 28057->28059 28075 65efcc8 SetThreadContext 28057->28075 28076 65efcc0 SetThreadContext 28057->28076 28058 7fd8c87 28058->28056 28073 7fd0648 WriteProcessMemory 28058->28073 28074 7fd0650 WriteProcessMemory 28058->28074 28063 65ef758 ResumeThread 28059->28063 28064 65ef750 ResumeThread 28059->28064 28060->28040 28063->28060 28064->28060 28065->28055 28066->28055 28067->28054 28068->28054 28069->28057 28070->28057 28071->28058 28072->28058 28073->28058 28074->28058 28075->28059 28076->28059 28077->28053 28078->28053 28080 7fd86d3 28079->28080 28089 7fd910f 28080->28089 28104 7fd095d CreateProcessA 28080->28104 28105 7fd0968 CreateProcessA 28080->28105 28081 7fd8895 28082 7fd89d9 28081->28082 28145 65efcc0 28081->28145 28149 65efcc8 28081->28149 28153 7fd0770 28082->28153 28157 7fd0769 28082->28157 28083 7fd8aca 28161 7fd0560 28083->28161 28165 7fd0558 28083->28165 28084 7fd8c18 28169 7fd0650 28084->28169 28173 7fd0648 28084->28173 28085 7fd8c87 28086 7fd8edb 28085->28086 28098 7fd0648 WriteProcessMemory 28085->28098 28099 7fd0650 WriteProcessMemory 28085->28099 28094 7fd0648 WriteProcessMemory 28086->28094 28095 7fd0650 WriteProcessMemory 28086->28095 28087 7fd8f3a 28088 7fd904b 28087->28088 28100 65efcc8 SetThreadContext 28087->28100 28101 65efcc0 SetThreadContext 28087->28101 28177 65ef750 28088->28177 28181 65ef758 28088->28181 28089->28040 28094->28087 28095->28087 28098->28085 28099->28085 28100->28088 28101->28088 28104->28081 28105->28081 28109 7fd86d3 28108->28109 28118 7fd910f 28109->28118 28121 7fd095d CreateProcessA 28109->28121 28122 7fd0968 CreateProcessA 28109->28122 28110 7fd8895 28111 7fd89d9 28110->28111 28119 65efcc8 SetThreadContext 28110->28119 28120 65efcc0 SetThreadContext 28110->28120 28127 7fd0769 ReadProcessMemory 28111->28127 28128 7fd0770 ReadProcessMemory 28111->28128 28112 7fd8aca 28125 7fd0558 VirtualAllocEx 28112->28125 28126 7fd0560 VirtualAllocEx 28112->28126 28113 7fd8c18 28131 7fd0648 WriteProcessMemory 28113->28131 28132 7fd0650 WriteProcessMemory 28113->28132 28114 7fd8edb 28129 7fd0648 WriteProcessMemory 28114->28129 28130 7fd0650 WriteProcessMemory 28114->28130 28115 7fd8f3a 28117 7fd904b 28115->28117 28135 65efcc8 SetThreadContext 28115->28135 28136 65efcc0 SetThreadContext 28115->28136 28116 7fd8c87 28116->28114 28133 7fd0648 WriteProcessMemory 28116->28133 28134 7fd0650 WriteProcessMemory 28116->28134 28123 65ef758 ResumeThread 28117->28123 28124 65ef750 ResumeThread 28117->28124 28118->28040 28119->28111 28120->28111 28121->28110 28122->28110 28123->28118 28124->28118 28125->28113 28126->28113 28127->28112 28128->28112 28129->28115 28130->28115 28131->28116 28132->28116 28133->28116 28134->28116 28135->28117 28136->28117 28138 7fd096b CreateProcessA 28137->28138 28140 7fd0bb3 28138->28140 28142 7fd09f1 CreateProcessA 28141->28142 28144 7fd0bb3 28142->28144 28146 65efccb SetThreadContext 28145->28146 28148 65efd55 28146->28148 28148->28082 28150 65efd0d SetThreadContext 28149->28150 28152 65efd55 28150->28152 28152->28082 28154 7fd07bb ReadProcessMemory 28153->28154 28156 7fd07ff 28154->28156 28156->28083 28158 7fd07bb ReadProcessMemory 28157->28158 28160 7fd07ff 28158->28160 28160->28083 28162 7fd05a0 VirtualAllocEx 28161->28162 28164 7fd05dd 28162->28164 28164->28084 28166 7fd05a0 VirtualAllocEx 28165->28166 28168 7fd05dd 28166->28168 28168->28084 28170 7fd0698 WriteProcessMemory 28169->28170 28172 7fd06ef 28170->28172 28172->28085 28174 7fd0698 WriteProcessMemory 28173->28174 28176 7fd06ef 28174->28176 28176->28085 28178 65ef75b ResumeThread 28177->28178 28180 65ef7c9 28178->28180 28180->28089 28182 65ef798 ResumeThread 28181->28182 28184 65ef7c9 28182->28184 28184->28089 28197 7fd9750 28198 7fd98db 28197->28198 28199 7fd9776 28197->28199 28199->28198 28202 7fd99c8 28199->28202 28205 7fd99d0 PostMessageW 28199->28205 28203 7fd99d0 PostMessageW 28202->28203 28204 7fd9a3c 28203->28204 28204->28199 28206 7fd9a3c 28205->28206 28206->28199 28207 7fd9c10 28208 7fd9c15 28207->28208 28209 7fd9c70 28208->28209 28212 3178290 28208->28212 28217 31782a0 28208->28217 28213 31782ad 28212->28213 28216 31782d6 28212->28216 28213->28216 28222 7fd9cc8 28213->28222 28234 7fd9cb3 28213->28234 28216->28208 28218 31782ad 28217->28218 28219 31782d6 28217->28219 28218->28219 28220 7fd9cc8 7 API calls 28218->28220 28221 7fd9cb3 7 API calls 28218->28221 28219->28208 28220->28219 28221->28219 28223 7fd9ccd 28222->28223 28224 7fd9d11 RtlDecodePointer 28223->28224 28227 7fd9f33 28223->28227 28225 7fd9d4c RtlDecodePointer 28224->28225 28226 7fd9d45 28224->28226 28229 7fd9d8a 28225->28229 28226->28225 28227->28216 28228 7fd9dc3 RtlEncodePointer 28228->28229 28229->28227 28229->28228 28230 7fd9e0f RtlDecodePointer 28229->28230 28231 7fd9e46 RtlEncodePointer 28229->28231 28232 7fd9e91 RtlDecodePointer 28229->28232 28233 7fd9ecc RtlDecodePointer 28229->28233 28230->28229 28230->28231 28231->28229 28232->28229 28232->28233 28233->28229 28235 7fd9cc8 28234->28235 28236 7fd9d11 RtlDecodePointer 28235->28236 28240 7fd9f33 28235->28240 28237 7fd9d4c RtlDecodePointer 28236->28237 28238 7fd9d45 28236->28238 28245 7fd9d8a 28237->28245 28238->28237 28239 7fd9dc3 RtlEncodePointer 28239->28245 28240->28216 28241 7fd9e0f RtlDecodePointer 28242 7fd9e46 RtlEncodePointer 28241->28242 28241->28245 28242->28245 28243 7fd9e91 RtlDecodePointer 28244 7fd9ecc RtlDecodePointer 28243->28244 28243->28245 28244->28245 28245->28239 28245->28240 28245->28241 28245->28242 28245->28243 28245->28244 28185 317e708 28186 317e750 GetModuleHandleW 28185->28186 28187 317e74a 28185->28187 28188 317e77d 28186->28188 28187->28186 28246 3173df8 28247 3173e0a 28246->28247 28248 3173e16 28247->28248 28250 3174310 28247->28250 28251 3174335 28250->28251 28255 3174401 28251->28255 28259 3174410 28251->28259 28257 3174437 28255->28257 28256 3174514 28256->28256 28257->28256 28263 3174004 28257->28263 28260 3174437 28259->28260 28261 3174514 28260->28261 28262 3174004 CreateActCtxA 28260->28262 28262->28261 28264 31754a0 CreateActCtxA 28263->28264 28266 3175563 28264->28266 28266->28266

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 205 65e8360-65e8381 206 65e8388-65e847c 205->206 207 65e8383 205->207 209 65e8b84-65e8bac 206->209 210 65e8482-65e85d9 206->210 207->206 213 65e9295-65e929e 209->213 254 65e85df-65e863a 210->254 255 65e8b52-65e8b82 210->255 214 65e8bba-65e8bc3 213->214 215 65e92a4-65e92bb 213->215 217 65e8bca-65e8cbe 214->217 218 65e8bc5 214->218 236 65e8ce8 217->236 237 65e8cc0-65e8ccc 217->237 218->217 241 65e8cee-65e8d0e 236->241 239 65e8cce-65e8cd4 237->239 240 65e8cd6-65e8cdc 237->240 242 65e8ce6 239->242 240->242 246 65e8d6e-65e8de8 241->246 247 65e8d10-65e8d69 241->247 242->241 266 65e8e3f-65e8e82 246->266 267 65e8dea-65e8e3d 246->267 260 65e9292 247->260 261 65e863f-65e864a 254->261 262 65e863c 254->262 255->209 260->213 265 65e8a64-65e8a6a 261->265 262->261 268 65e864f-65e866d 265->268 269 65e8a70-65e8aed 265->269 296 65e8e8d-65e8e93 266->296 267->296 272 65e866f-65e8673 268->272 273 65e86c4-65e86d9 268->273 313 65e8b3c-65e8b42 269->313 272->273 275 65e8675-65e8680 272->275 278 65e86db 273->278 279 65e86e0-65e86f6 273->279 281 65e86b6-65e86bc 275->281 278->279 283 65e86fd-65e8714 279->283 284 65e86f8 279->284 288 65e86be-65e86bf 281->288 289 65e8682-65e8686 281->289 285 65e871b-65e8731 283->285 286 65e8716 283->286 284->283 293 65e8738-65e873f 285->293 294 65e8733 285->294 286->285 295 65e8742-65e8968 288->295 291 65e868c-65e86a4 289->291 292 65e8688 289->292 297 65e86ab-65e86b3 291->297 298 65e86a6 291->298 292->291 293->295 294->293 304 65e89cc-65e89e1 295->304 305 65e896a-65e896e 295->305 300 65e8eea-65e8ef6 296->300 297->281 298->297 301 65e8ef8-65e8f80 300->301 302 65e8e95-65e8eb7 300->302 338 65e9105-65e910e 301->338 306 65e8ebe-65e8ee7 302->306 307 65e8eb9 302->307 309 65e89e8-65e8a09 304->309 310 65e89e3 304->310 305->304 312 65e8970-65e897f 305->312 306->300 307->306 315 65e8a0b 309->315 316 65e8a10-65e8a2f 309->316 310->309 317 65e89be-65e89c4 312->317 318 65e8aef-65e8b39 313->318 319 65e8b44-65e8b4a 313->319 315->316 323 65e8a36-65e8a56 316->323 324 65e8a31 316->324 320 65e89c6-65e89c7 317->320 321 65e8981-65e8985 317->321 318->313 319->255 326 65e8a61 320->326 327 65e898f-65e89b0 321->327 328 65e8987-65e898b 321->328 329 65e8a5d 323->329 330 65e8a58 323->330 324->323 326->265 332 65e89b7-65e89bb 327->332 333 65e89b2 327->333 328->327 329->326 330->329 332->317 333->332 339 65e9114-65e916f 338->339 340 65e8f85-65e8f9a 338->340 355 65e91a6-65e91d0 339->355 356 65e9171-65e91a4 339->356 341 65e8f9c 340->341 342 65e8fa3-65e90f9 340->342 341->342 343 65e8fee-65e902e 341->343 344 65e9078-65e90b8 341->344 345 65e8fa9-65e8fe9 341->345 346 65e9033-65e9073 341->346 359 65e90ff 342->359 343->359 344->359 345->359 346->359 364 65e91d9-65e926c 355->364 356->364 359->338 368 65e9273-65e928b 364->368 368->260
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (D8O$UUUU
                                          • API String ID: 0-1767718379
                                          • Opcode ID: 2d90adc242c135b56de02faf8c6097ea3cf8a3a773d607acb748a96fd1c925e1
                                          • Instruction ID: a6bc504ccbd5bff026ef5a7063fb026de75d5416071bf16a6fb5dc239c856621
                                          • Opcode Fuzzy Hash: 2d90adc242c135b56de02faf8c6097ea3cf8a3a773d607acb748a96fd1c925e1
                                          • Instruction Fuzzy Hash: DAA2B475E00628CFDB64CF69C984A99BBB2FF89304F1581E9D509AB325DB319E81CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 369 7fd86a0-7fd86d1 370 7fd86d8-7fd9278 369->370 371 7fd86d3 369->371 373 7fd927e-7fd9285 370->373 374 7fd878a-7fd8890 370->374 371->370 497 7fd8893 call 7fd095d 374->497 498 7fd8893 call 7fd0968 374->498 381 7fd8895-7fd88b5 382 7fd88dd-7fd8973 381->382 383 7fd88b7-7fd88d2 381->383 391 7fd897a-7fd89bc 382->391 392 7fd8975 382->392 383->382 395 7fd89be-7fd89d4 391->395 396 7fd8a25-7fd8a60 391->396 392->391 495 7fd89d7 call 65efcc8 395->495 496 7fd89d7 call 65efcc0 395->496 401 7fd8a88 396->401 402 7fd8a62-7fd8a7d 396->402 397 7fd89d9-7fd89f9 399 7fd89fb-7fd8a16 397->399 400 7fd8a21-7fd8a23 397->400 399->400 403 7fd8a89-7fd8a93 400->403 401->403 402->401 406 7fd8a9a-7fd8ac5 403->406 407 7fd8a95 403->407 503 7fd8ac8 call 7fd0769 406->503 504 7fd8ac8 call 7fd0770 406->504 407->406 410 7fd8aca-7fd8aea 411 7fd8aec-7fd8b07 410->411 412 7fd8b12-7fd8b2b 410->412 411->412 413 7fd8b2d-7fd8b61 412->413 414 7fd8b89-7fd8c13 412->414 413->414 419 7fd8b63-7fd8b7e 413->419 501 7fd8c16 call 7fd0558 414->501 502 7fd8c16 call 7fd0560 414->502 419->414 425 7fd8c18-7fd8c3e 426 7fd8c66-7fd8c82 425->426 427 7fd8c40-7fd8c5b 425->427 507 7fd8c85 call 7fd0648 426->507 508 7fd8c85 call 7fd0650 426->508 427->426 429 7fd8c87-7fd8ca7 430 7fd8ccf-7fd8d1a 429->430 431 7fd8ca9-7fd8cc4 429->431 437 7fd8eb9-7fd8ed5 430->437 431->430 438 7fd8d1f-7fd8de5 437->438 439 7fd8edb-7fd8f35 437->439 457 7fd8eae-7fd8eb3 438->457 458 7fd8deb-7fd8e60 438->458 505 7fd8f38 call 7fd0648 439->505 506 7fd8f38 call 7fd0650 439->506 445 7fd8f3a-7fd8f5a 446 7fd8f5c-7fd8f77 445->446 447 7fd8f82-7fd8fcb 445->447 446->447 455 7fd8fcd-7fd8fd0 447->455 456 7fd8fd3-7fd8fe6 447->456 455->456 459 7fd8fed-7fd902e 456->459 460 7fd8fe8 456->460 457->437 509 7fd8e63 call 7fd0648 458->509 510 7fd8e63 call 7fd0650 458->510 465 7fd9097-7fd90d2 459->465 466 7fd9030-7fd9046 459->466 460->459 472 7fd90fa 465->472 473 7fd90d4-7fd90ef 465->473 511 7fd9049 call 65efcc8 466->511 512 7fd9049 call 65efcc0 466->512 467 7fd8e65-7fd8e85 470 7fd8ead 467->470 471 7fd8e87-7fd8ea2 467->471 468 7fd904b-7fd906b 474 7fd906d-7fd9088 468->474 475 7fd9093-7fd9095 468->475 470->457 471->470 477 7fd90fb-7fd910a 472->477 473->472 474->475 475->477 499 7fd910d call 65ef758 477->499 500 7fd910d call 65ef750 477->500 481 7fd910f-7fd912f 483 7fd9157-7fd9171 481->483 484 7fd9131-7fd914c 481->484 486 7fd91c4-7fd925c 483->486 487 7fd9173-7fd91bd call 7fd1360 483->487 484->483 486->373 494 7fd91c2-7fd91c3 487->494 494->486 495->397 496->397 497->381 498->381 499->481 500->481 501->425 502->425 503->410 504->410 505->445 506->445 507->429 508->429 509->467 510->467 511->468 512->468
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (
                                          • API String ID: 0-3887548279
                                          • Opcode ID: 39e5290f0e457fc22fc23e4cba3d3bc7c461276aa9e6bce219a01393111dafed
                                          • Instruction ID: 91e9b8634f93fb5c0d7d6713dc2e69df9bdb8dca2476e8a65ff7f48863df0d8b
                                          • Opcode Fuzzy Hash: 39e5290f0e457fc22fc23e4cba3d3bc7c461276aa9e6bce219a01393111dafed
                                          • Instruction Fuzzy Hash: BF62D374E012298FDB64DF69C898BDDBBB2FB89305F1480EAD509A7250DB346E85CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4077e1ce3c326487ad6c5f2c107fc139e0a4ae404a6623d338f7c8ec9875a740
                                          • Instruction ID: acbe6bd9b26c579a767a35a28494c716c0e0cfe115fcfb004148fd91ed26387f
                                          • Opcode Fuzzy Hash: 4077e1ce3c326487ad6c5f2c107fc139e0a4ae404a6623d338f7c8ec9875a740
                                          • Instruction Fuzzy Hash: A3428F74E11229CFDB54CFA9C985B9DBBF2BF48300F1581A9E809A7355D731AA81CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 03aa61a188256d3871cbf84227de5c0c29d27f31b3478d6fd50d5e27e46324ef
                                          • Instruction ID: 50465f6682d343d61b3969f4d5de102702350cde1f7733f0cdf4d44759dec544
                                          • Opcode Fuzzy Hash: 03aa61a188256d3871cbf84227de5c0c29d27f31b3478d6fd50d5e27e46324ef
                                          • Instruction Fuzzy Hash: 4C32A174E0021ACFEB54DFA9C984A9EFBB2BF48751F59C195C508AB211DB30D985CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.566271363.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3170000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8967dc2a3e7a12421f8eda4f66574b7e5d41b48eb4de6f687434807b1b03243f
                                          • Instruction ID: 717108fb2fdd46076f94a7096f93dc69fd041199b01a5825202e747b6c13a2fb
                                          • Opcode Fuzzy Hash: 8967dc2a3e7a12421f8eda4f66574b7e5d41b48eb4de6f687434807b1b03243f
                                          • Instruction Fuzzy Hash: B2D18075A046058FC714CF69C884AAAFBF6FF88310F19C669D5599B792D730E841CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 873e0649267e236cce87632a9bc4a27133b7c4610af5ac7b47d491b5ff2254f3
                                          • Instruction ID: 8355d791b7ddec98b58cd7457985c0d92ac7a6581c2bbe411a19c50af2932c58
                                          • Opcode Fuzzy Hash: 873e0649267e236cce87632a9bc4a27133b7c4610af5ac7b47d491b5ff2254f3
                                          • Instruction Fuzzy Hash: 65C169B1B016058FDB29DB75D460B6EB7F6AF89600F18846DD146DB2A0DB34ED02CB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e8c7b51ac20496f2b0b53854b183a8eedb497b22cc70869245e978a73a2d803a
                                          • Instruction ID: cee9c1c6c60cd43ca81be33900cd519c8e2fd2c9cd21dedd2ea65c216a078fb3
                                          • Opcode Fuzzy Hash: e8c7b51ac20496f2b0b53854b183a8eedb497b22cc70869245e978a73a2d803a
                                          • Instruction Fuzzy Hash: 53A1C274E052198FCF58CFA9D5849AEBBF2BF89310F24856AD818EB355D7309942CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8d90eda7caf386c8cb387fcf41a778203a4f21c351755394f916eacb829b8979
                                          • Instruction ID: 022b4ceb31069e209da3f066443c5aaef295ae4e2efcc38b3c854ada7b8ee342
                                          • Opcode Fuzzy Hash: 8d90eda7caf386c8cb387fcf41a778203a4f21c351755394f916eacb829b8979
                                          • Instruction Fuzzy Hash: CC61A574E01218CFDB18CF6AD985B9DBBF2BF88300F1481A9E809AB354DB359942CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f4df79fdf9121a2299d85346a9cdcb7ac6af9ebb8c4b9378d0133ea54e5c9b9
                                          • Instruction ID: a49d85d0d54c8434dc116482a80aa0132373be5e207116eee0aa992c47b4b77c
                                          • Opcode Fuzzy Hash: 4f4df79fdf9121a2299d85346a9cdcb7ac6af9ebb8c4b9378d0133ea54e5c9b9
                                          • Instruction Fuzzy Hash: 75516D75E002199FDF08DFEAD844AEEBBB2FF89300F14902AE519AB254DB745946CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b90822aa934ef5c2cf218375c07ca05a05444dc4e6b5bf094a4893f41688de48
                                          • Instruction ID: 8dcea120eabbb2b8cdac15fedf3ac4c54ac9f9ac514a49ba92c22e860e334976
                                          • Opcode Fuzzy Hash: b90822aa934ef5c2cf218375c07ca05a05444dc4e6b5bf094a4893f41688de48
                                          • Instruction Fuzzy Hash: CD41D974E006198FEB58DFAAD85479EBBB2BFC8200F14C4AAC558A7264DA300A85CF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e04e8ac999e5479f1580b22c6e8489456c9150dcbf09a23ae38f597009b78500
                                          • Instruction ID: ec4a25d2f2d994f6d4fab39a980601c107e48a44c74517e3cb3c2977e3360a5b
                                          • Opcode Fuzzy Hash: e04e8ac999e5479f1580b22c6e8489456c9150dcbf09a23ae38f597009b78500
                                          • Instruction Fuzzy Hash: 62418EB5E042198FDB48CFAAD9856AEFBF2BF88300F14C12AD519AB254DB345946CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • RtlDecodePointer.NTDLL ref: 07FD9D2F
                                          • RtlDecodePointer.NTDLL ref: 07FD9D74
                                          • RtlEncodePointer.NTDLL(00000000), ref: 07FD9DDF
                                          • RtlDecodePointer.NTDLL(-000000FC), ref: 07FD9E29
                                          • RtlEncodePointer.NTDLL(00000000), ref: 07FD9E69
                                          • RtlDecodePointer.NTDLL ref: 07FD9EAF
                                          • RtlDecodePointer.NTDLL ref: 07FD9EF3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: Pointer$Decode$Encode
                                          • String ID:
                                          • API String ID: 1638560559-0
                                          • Opcode ID: 5d8c3b14846371b41fc47b0b8eddad836f27fc17d170e72f1430d16f18db8f02
                                          • Instruction ID: 252c96df5cbaaeac8f806365f883ce59916b15722f9f0986d147ca2af784c430
                                          • Opcode Fuzzy Hash: 5d8c3b14846371b41fc47b0b8eddad836f27fc17d170e72f1430d16f18db8f02
                                          • Instruction Fuzzy Hash: 918108B4C05258DFDB21DFA9D1887CDBBF6EB18318F28844AE855A7290C7B56884CF61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 40 7fd9cb3-7fd9cc6 41 7fd9ccd-7fd9d0b 40->41 42 7fd9cc8-7fd9ccc 40->42 43 7fd9f59-7fd9f74 41->43 44 7fd9d11-7fd9d43 RtlDecodePointer 41->44 42->41 45 7fd9d4c-7fd9d88 RtlDecodePointer 44->45 46 7fd9d45-7fd9d4b 44->46 48 7fd9d8a-7fd9d90 45->48 49 7fd9d91-7fd9d9e 45->49 46->45 48->49 51 7fd9da4-7fd9da8 49->51 52 7fd9f33-7fd9f56 49->52 51->52 55 7fd9dae-7fd9db0 51->55 52->43 55->52 56 7fd9db6-7fd9db9 55->56 57 7fd9dbc-7fd9dc1 56->57 59 7fd9e07-7fd9e09 57->59 60 7fd9dc3-7fd9df3 RtlEncodePointer 57->60 59->52 64 7fd9e0f-7fd9e3d RtlDecodePointer 59->64 62 7fd9dfc-7fd9e05 60->62 63 7fd9df5-7fd9dfb 60->63 62->57 62->59 63->62 65 7fd9e3f-7fd9e45 64->65 66 7fd9e46-7fd9e7d RtlEncodePointer 64->66 65->66 68 7fd9e7f-7fd9e85 66->68 69 7fd9e86-7fd9ec3 RtlDecodePointer 66->69 68->69 73 7fd9ecc-7fd9f07 RtlDecodePointer 69->73 74 7fd9ec5-7fd9ecb 69->74 75 7fd9f09-7fd9f0f 73->75 76 7fd9f10-7fd9f19 73->76 74->73 75->76 78 7fd9f1b-7fd9f1e 76->78 79 7fd9f24-7fd9f2e 76->79 78->57 78->79 79->57
                                          APIs
                                          • RtlDecodePointer.NTDLL ref: 07FD9D2F
                                          • RtlDecodePointer.NTDLL ref: 07FD9D74
                                          • RtlEncodePointer.NTDLL(00000000), ref: 07FD9DDF
                                          • RtlDecodePointer.NTDLL(-000000FC), ref: 07FD9E29
                                          • RtlEncodePointer.NTDLL(00000000), ref: 07FD9E69
                                          • RtlDecodePointer.NTDLL ref: 07FD9EAF
                                          • RtlDecodePointer.NTDLL ref: 07FD9EF3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: Pointer$Decode$Encode
                                          • String ID:
                                          • API String ID: 1638560559-0
                                          • Opcode ID: f88ff1da9164e9424389419d2f5258fbacef5541d9a0746284bdf99b88dab0a1
                                          • Instruction ID: 95c5e32687d782f67c68af6ca418b3c10adf439fd09ceb9891bdcc2cc6c763af
                                          • Opcode Fuzzy Hash: f88ff1da9164e9424389419d2f5258fbacef5541d9a0746284bdf99b88dab0a1
                                          • Instruction Fuzzy Hash: 627128B0C052589FDB21DFA9D1887CDBFF1EB18314F28844AE854A7290C7B56884CF61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 513 7fd095d-7fd09fd 516 7fd09ff-7fd0a09 513->516 517 7fd0a36-7fd0a56 513->517 516->517 518 7fd0a0b-7fd0a0d 516->518 524 7fd0a8f-7fd0abe 517->524 525 7fd0a58-7fd0a62 517->525 519 7fd0a0f-7fd0a19 518->519 520 7fd0a30-7fd0a33 518->520 522 7fd0a1d-7fd0a2c 519->522 523 7fd0a1b 519->523 520->517 522->522 526 7fd0a2e 522->526 523->522 531 7fd0af7-7fd0bb1 CreateProcessA 524->531 532 7fd0ac0-7fd0aca 524->532 525->524 527 7fd0a64-7fd0a66 525->527 526->520 529 7fd0a89-7fd0a8c 527->529 530 7fd0a68-7fd0a72 527->530 529->524 533 7fd0a74 530->533 534 7fd0a76-7fd0a85 530->534 545 7fd0bba-7fd0c40 531->545 546 7fd0bb3-7fd0bb9 531->546 532->531 536 7fd0acc-7fd0ace 532->536 533->534 534->534 535 7fd0a87 534->535 535->529 537 7fd0af1-7fd0af4 536->537 538 7fd0ad0-7fd0ada 536->538 537->531 540 7fd0adc 538->540 541 7fd0ade-7fd0aed 538->541 540->541 541->541 543 7fd0aef 541->543 543->537 556 7fd0c50-7fd0c54 545->556 557 7fd0c42-7fd0c46 545->557 546->545 559 7fd0c64-7fd0c68 556->559 560 7fd0c56-7fd0c5a 556->560 557->556 558 7fd0c48 557->558 558->556 562 7fd0c78-7fd0c7c 559->562 563 7fd0c6a-7fd0c6e 559->563 560->559 561 7fd0c5c 560->561 561->559 565 7fd0c8e-7fd0c95 562->565 566 7fd0c7e-7fd0c84 562->566 563->562 564 7fd0c70 563->564 564->562 567 7fd0cac 565->567 568 7fd0c97-7fd0ca6 565->568 566->565 570 7fd0cad 567->570 568->567 570->570
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07FD0B9E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: b5f17fbe3cea299b4964f5d29155deaa91e04b92ab88b666345dc1bb515a65e1
                                          • Instruction ID: 222cca530cdf3b3d177afd559b5a68701529f17dd60f21bce7352501611926f0
                                          • Opcode Fuzzy Hash: b5f17fbe3cea299b4964f5d29155deaa91e04b92ab88b666345dc1bb515a65e1
                                          • Instruction Fuzzy Hash: 07A12CB1D00219DFDB14DFA8C881BEEBBB2BF44314F1885A9D819A7290DB749D85CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 571 7fd0968-7fd09fd 573 7fd09ff-7fd0a09 571->573 574 7fd0a36-7fd0a56 571->574 573->574 575 7fd0a0b-7fd0a0d 573->575 581 7fd0a8f-7fd0abe 574->581 582 7fd0a58-7fd0a62 574->582 576 7fd0a0f-7fd0a19 575->576 577 7fd0a30-7fd0a33 575->577 579 7fd0a1d-7fd0a2c 576->579 580 7fd0a1b 576->580 577->574 579->579 583 7fd0a2e 579->583 580->579 588 7fd0af7-7fd0bb1 CreateProcessA 581->588 589 7fd0ac0-7fd0aca 581->589 582->581 584 7fd0a64-7fd0a66 582->584 583->577 586 7fd0a89-7fd0a8c 584->586 587 7fd0a68-7fd0a72 584->587 586->581 590 7fd0a74 587->590 591 7fd0a76-7fd0a85 587->591 602 7fd0bba-7fd0c40 588->602 603 7fd0bb3-7fd0bb9 588->603 589->588 593 7fd0acc-7fd0ace 589->593 590->591 591->591 592 7fd0a87 591->592 592->586 594 7fd0af1-7fd0af4 593->594 595 7fd0ad0-7fd0ada 593->595 594->588 597 7fd0adc 595->597 598 7fd0ade-7fd0aed 595->598 597->598 598->598 600 7fd0aef 598->600 600->594 613 7fd0c50-7fd0c54 602->613 614 7fd0c42-7fd0c46 602->614 603->602 616 7fd0c64-7fd0c68 613->616 617 7fd0c56-7fd0c5a 613->617 614->613 615 7fd0c48 614->615 615->613 619 7fd0c78-7fd0c7c 616->619 620 7fd0c6a-7fd0c6e 616->620 617->616 618 7fd0c5c 617->618 618->616 622 7fd0c8e-7fd0c95 619->622 623 7fd0c7e-7fd0c84 619->623 620->619 621 7fd0c70 620->621 621->619 624 7fd0cac 622->624 625 7fd0c97-7fd0ca6 622->625 623->622 627 7fd0cad 624->627 625->624 627->627
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07FD0B9E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 10ebd4cc4e972d23923f036cc8b7934200ef6057d7007b8c7cdd5dd17020ff4c
                                          • Instruction ID: edc79804d530c5660fd5425ed6bf4e0d9f3fa2c792803de62d700721f9afab0f
                                          • Opcode Fuzzy Hash: 10ebd4cc4e972d23923f036cc8b7934200ef6057d7007b8c7cdd5dd17020ff4c
                                          • Instruction Fuzzy Hash: 37912CB1D00219DFDF14DFA9C880BDEBBB2BB48314F1885A9E819A7250DB749D85CF91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 628 3174004-3175561 CreateActCtxA 631 3175563-3175569 628->631 632 317556a-31755c4 628->632 631->632 639 31755c6-31755c9 632->639 640 31755d3-31755d7 632->640 639->640 641 31755d9-31755e5 640->641 642 31755e8 640->642 641->642 644 31755e9 642->644 644->644
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 03175551
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.566271363.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3170000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: b82b3a55ee11a6f4aff6663ca8a8e8c2fb17117def70160eeb2e65a1165705a4
                                          • Instruction ID: 939c15b916962309781da116c3008e58446a4c4b08c64ac9a57ce6235703f491
                                          • Opcode Fuzzy Hash: b82b3a55ee11a6f4aff6663ca8a8e8c2fb17117def70160eeb2e65a1165705a4
                                          • Instruction Fuzzy Hash: D641DFB1C0061CCBDB24DFA9C884B8EBBF6BF59304F24806AD408AB251DB756945CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 645 3175495-3175561 CreateActCtxA 647 3175563-3175569 645->647 648 317556a-31755c4 645->648 647->648 655 31755c6-31755c9 648->655 656 31755d3-31755d7 648->656 655->656 657 31755d9-31755e5 656->657 658 31755e8 656->658 657->658 660 31755e9 658->660 660->660
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 03175551
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.566271363.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3170000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 37232d0d6fd3010c8f9105520e13765b487c8b3717551ffb07dac7a198dc0556
                                          • Instruction ID: ae4ecc0d1c396e9722351b559b013068e383252419e5c2afa1252ae8f38124e5
                                          • Opcode Fuzzy Hash: 37232d0d6fd3010c8f9105520e13765b487c8b3717551ffb07dac7a198dc0556
                                          • Instruction Fuzzy Hash: EF41FEB1C00659CFDB24DFA9C984BCEBBF2BF59304F24816AD408AB250DB756946CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 661 7fd0648-7fd069e 663 7fd06ae-7fd06ed WriteProcessMemory 661->663 664 7fd06a0-7fd06ac 661->664 666 7fd06ef-7fd06f5 663->666 667 7fd06f6-7fd0726 663->667 664->663 666->667
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07FD06E0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: b4e3a378630774abff63a7fc8ea142bbe1bab5c1b198e9b73a03c21b1633e664
                                          • Instruction ID: 6f5a64a9d3e13aa4a842c06a1ba9c31510cd54919d91b7f01a4a8e43a219ab07
                                          • Opcode Fuzzy Hash: b4e3a378630774abff63a7fc8ea142bbe1bab5c1b198e9b73a03c21b1633e664
                                          • Instruction Fuzzy Hash: B42117B1D003599FCB14DFA9C8847EEBBF5FF88314F14852AE959A7250CB789944CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 671 7fd0650-7fd069e 673 7fd06ae-7fd06ed WriteProcessMemory 671->673 674 7fd06a0-7fd06ac 671->674 676 7fd06ef-7fd06f5 673->676 677 7fd06f6-7fd0726 673->677 674->673 676->677
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07FD06E0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 83b6065d463068d575f6057bbaee768e11f27893318df9b360436951295abeee
                                          • Instruction ID: da0e33f0948bbea839ffb3643de976acaa8fd1b0f0a2d088e74d4924fd950d48
                                          • Opcode Fuzzy Hash: 83b6065d463068d575f6057bbaee768e11f27893318df9b360436951295abeee
                                          • Instruction Fuzzy Hash: B321F8B19003599FCB10DFA9C8847DEBBF5FF48314F54842AE959A7240DB789944CBA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 681 65efcc0-65efd13 684 65efd15-65efd21 681->684 685 65efd23-65efd53 SetThreadContext 681->685 684->685 687 65efd5c-65efd8c 685->687 688 65efd55-65efd5b 685->688 688->687
                                          APIs
                                          • SetThreadContext.KERNELBASE(?,00000000), ref: 065EFD46
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: ContextThread
                                          • String ID:
                                          • API String ID: 1591575202-0
                                          • Opcode ID: 1444bb53c4a5bfb590698cce27a555ea91e2f7f3c499d3e0adcff3a38ce46df8
                                          • Instruction ID: 4bfd7e2c9c99dac1afc0463c21f33c70892fdb69a99481219aa33a369e72c860
                                          • Opcode Fuzzy Hash: 1444bb53c4a5bfb590698cce27a555ea91e2f7f3c499d3e0adcff3a38ce46df8
                                          • Instruction Fuzzy Hash: 58213871D002098FCB54DFAAC5847EEBBF4FF98324F54852AD469A7280DB789945CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 692 7fd0769-7fd07fd ReadProcessMemory 695 7fd07ff-7fd0805 692->695 696 7fd0806-7fd0836 692->696 695->696
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07FD07F0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: d068b34424e82808fbf6389d469a200285d34e7614fd118c2c47c98dc43f6fd1
                                          • Instruction ID: c85f84040361270aa5bbbef6dc1cb82cc66b3a5e5e5b9ce0234123ad31718d08
                                          • Opcode Fuzzy Hash: d068b34424e82808fbf6389d469a200285d34e7614fd118c2c47c98dc43f6fd1
                                          • Instruction Fuzzy Hash: 052136B1C002599FCB10DFAAC880AEEBBF5FF48310F14852AE519A7250C7389951CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 700 65efcc8-65efd13 702 65efd15-65efd21 700->702 703 65efd23-65efd53 SetThreadContext 700->703 702->703 705 65efd5c-65efd8c 703->705 706 65efd55-65efd5b 703->706 706->705
                                          APIs
                                          • SetThreadContext.KERNELBASE(?,00000000), ref: 065EFD46
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: ContextThread
                                          • String ID:
                                          • API String ID: 1591575202-0
                                          • Opcode ID: 6e419b13abf4c237fc6868016d39c997972516fd3c45f20093f69d759f4307af
                                          • Instruction ID: e1d1cb958ff0bf42a7547734aee71e1cd1d17a847e7f58e7d962178f5fa0a22f
                                          • Opcode Fuzzy Hash: 6e419b13abf4c237fc6868016d39c997972516fd3c45f20093f69d759f4307af
                                          • Instruction Fuzzy Hash: CA213571D002098FCB50DFAAC5847EEBBF4EF48324F54842AD459A7240DB78A944CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 710 7fd0770-7fd07fd ReadProcessMemory 713 7fd07ff-7fd0805 710->713 714 7fd0806-7fd0836 710->714 713->714
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07FD07F0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: d003c236cb5ebaf2cad10a141f8733b1d949a6f03a5113d32f85859a51151198
                                          • Instruction ID: 5fbe5a24f878390875cc66a313899107e3566d192e029e327f8dbf244cd0a856
                                          • Opcode Fuzzy Hash: d003c236cb5ebaf2cad10a141f8733b1d949a6f03a5113d32f85859a51151198
                                          • Instruction Fuzzy Hash: 582137B1C003599FCF10DFAAC880AEEBBF5FF48320F54842AE519A7240D7789940CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 03177F3D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.566271363.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3170000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID:
                                          • API String ID: 2118026453-0
                                          • Opcode ID: 726469c120f0132dcc100df01007bac5b7ded0c69d77f0efc575cc80fa0ac85b
                                          • Instruction ID: 6b398642e0cb46fd2e5ca0e82710cfb72547a94e992fff996a174f5dd29063d6
                                          • Opcode Fuzzy Hash: 726469c120f0132dcc100df01007bac5b7ded0c69d77f0efc575cc80fa0ac85b
                                          • Instruction Fuzzy Hash: 9E218EB18003498FDB60DF99D5087EABFF8EB18314F188469E465E7280CB79A544CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 03177C92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.566271363.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3170000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID:
                                          • API String ID: 2118026453-0
                                          • Opcode ID: e9c69f74c6d5cf5c814e6f5bb7e765b9b4614273b66829c0b659f0a60477555e
                                          • Instruction ID: ebe260e0ceff612fc13940e79500fcf9386e3a598235333f2892e3d165244b6a
                                          • Opcode Fuzzy Hash: e9c69f74c6d5cf5c814e6f5bb7e765b9b4614273b66829c0b659f0a60477555e
                                          • Instruction Fuzzy Hash: BE216AB49003498FDB60DFAAC5487DABFF8EB49318F28846AD805A3641C779A544CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0317E7E9,00000800,00000000,00000000), ref: 0317E9DA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.566271363.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3170000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 50dbf2a151e425ce1c4b2a5d0221176d0a1b8841043f2ead5039d932e86ca184
                                          • Instruction ID: 2001d4e652afbbc00cb4ace5be6210eaaebe2f946c424eb58dfb1083f89e28df
                                          • Opcode Fuzzy Hash: 50dbf2a151e425ce1c4b2a5d0221176d0a1b8841043f2ead5039d932e86ca184
                                          • Instruction Fuzzy Hash: 9D1112B69002098FCB50CF9AC484BDEFBF8EB58324F14856AE459B7600C379A945CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07FD05CE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 1a583d336c42ee66bce45b61d9314c324f779d550f7fe161d50311eb4da2d88f
                                          • Instruction ID: acf443a51e1c6a8ac033115335559e95fde888552f7e939d2071c3aeb4da48b7
                                          • Opcode Fuzzy Hash: 1a583d336c42ee66bce45b61d9314c324f779d550f7fe161d50311eb4da2d88f
                                          • Instruction Fuzzy Hash: E61117B19002499FCB10DFAAC844BDFBFF5EF58324F24882AE519A7250D7759944CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 03177C92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.566271363.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3170000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID:
                                          • API String ID: 2118026453-0
                                          • Opcode ID: bfe538d874005dae3ab5721134ed755071a160b9f4eda84d638b17fbcadb4db9
                                          • Instruction ID: 229c6a9b8c6e88b10cd6ca69f077245980855767d62dad33bb547fb773aef516
                                          • Opcode Fuzzy Hash: bfe538d874005dae3ab5721134ed755071a160b9f4eda84d638b17fbcadb4db9
                                          • Instruction Fuzzy Hash: EE1167B49003098FDB60DFAAC6487EBBBF8EB48328F248429D405A3740D7796544CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07FD05CE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: f148e753dd179de4c1b6042cf8d974745d534c348f9d6342a897410ff059fe99
                                          • Instruction ID: b62b690346da4feefd6c4c7cc0de51dadf53cdf0520337252fbb62279132a0b3
                                          • Opcode Fuzzy Hash: f148e753dd179de4c1b6042cf8d974745d534c348f9d6342a897410ff059fe99
                                          • Instruction Fuzzy Hash: 8B11F6B19002499BCB10DFAAC844BEEBBF5EF58324F14841AE555A7250DB79A944CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: ed3a3557d44c77a733579665d737f1057e832b71ff9c804693ed119912189dd8
                                          • Instruction ID: cbd56c027e0bcd00900d7c4be2f40869ccec158b37b25646861d6c70ab635458
                                          • Opcode Fuzzy Hash: ed3a3557d44c77a733579665d737f1057e832b71ff9c804693ed119912189dd8
                                          • Instruction Fuzzy Hash: 251149B1D002088FCB14DFAAC4447EEFBF5EF88324F20856AD029A7650DB78A545CF94
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 01ba11faf4d84ebb78ad6801c426354c790f4bc5da8c6be48bc371af7159fbdd
                                          • Instruction ID: 4f8e6d0d8646c7f24c971c96a249f48539faac04a09b72619034a7350d68e3c2
                                          • Opcode Fuzzy Hash: 01ba11faf4d84ebb78ad6801c426354c790f4bc5da8c6be48bc371af7159fbdd
                                          • Instruction Fuzzy Hash: 41113AB1D002498BCB14DFAAC4447EEFBF9EF88324F24841AD419A7640CB79A944CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0317E76E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.566271363.0000000003170000.00000040.00000800.00020000.00000000.sdmp, Offset: 03170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_3170000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 3c917b5ccddcd247de9ad3a1b3bf870afa6eaa8824f3d218ee7014bebf090afa
                                          • Instruction ID: 752caafe89b073703ac15eb23288811e482aff19e9a30b032a4df2108affc241
                                          • Opcode Fuzzy Hash: 3c917b5ccddcd247de9ad3a1b3bf870afa6eaa8824f3d218ee7014bebf090afa
                                          • Instruction Fuzzy Hash: 3211DFB6C006498FCB10CF9AC544ADEFBF9EB88224F14855AD429A7610D379A545CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 07FD9A2D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: aabea731eaecc0847217b09059ba9ecde61820ac682dfb70612649ad83cf419a
                                          • Instruction ID: ca5ccbaadb58e01f6986f2f65bb2e49809d706419dfc2173fdf4e206eaf7fae9
                                          • Opcode Fuzzy Hash: aabea731eaecc0847217b09059ba9ecde61820ac682dfb70612649ad83cf419a
                                          • Instruction Fuzzy Hash: 551106B68003499FDB10DF9AD584BDEFFF8EB58324F14845AE458A7600D375AA44CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 07FD9A2D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: af878206d73559090eb8df1a3d1a7c30214bc6e6cc9960e9a64d3daf3ea86e41
                                          • Instruction ID: 3ca8a9fb75f0067253da6323582d03e04e6b569a45c36babbeeeb2400ed4d0b7
                                          • Opcode Fuzzy Hash: af878206d73559090eb8df1a3d1a7c30214bc6e6cc9960e9a64d3daf3ea86e41
                                          • Instruction Fuzzy Hash: C01115B58003499FCB10DF9AD584BDEFFF8EB58324F14841AE458A3600D374A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564942032.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14bd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d4801201027f01ca5388ff710af1bf7281ecd9a723bca4c971356775e79462f7
                                          • Instruction ID: 948b6ca788dcef7ec94900ba449b6802722c9b2ae6558abe8505a4975d083f61
                                          • Opcode Fuzzy Hash: d4801201027f01ca5388ff710af1bf7281ecd9a723bca4c971356775e79462f7
                                          • Instruction Fuzzy Hash: 9F21D671904244DFDB06DF58D9C0B67BF65FB9432CF2485AAE9050A226C33AD456CAB1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564942032.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14bd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f02a28bb880ed886ec2b4605b9d4781c4aa37892d559e002963ef8d0fe5bfa1e
                                          • Instruction ID: dfd61398e145cbb071efcaa7aae218f14e509d6079eb341f132546b37a54e256
                                          • Opcode Fuzzy Hash: f02a28bb880ed886ec2b4605b9d4781c4aa37892d559e002963ef8d0fe5bfa1e
                                          • Instruction Fuzzy Hash: BC210871900240DFDB05DF54D9C0B97BF65FB84318F24C5BAE9090B656C33AE456C6B1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564994284.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14cd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e2ad8ba11c4e82ee45d72c2e1e7eff9ebe703b4f349b86efe9dcbd3be1d3e15e
                                          • Instruction ID: 08c26662855367b820b592ca0dd26c4ab7326bb186b267495bcac14080f92d44
                                          • Opcode Fuzzy Hash: e2ad8ba11c4e82ee45d72c2e1e7eff9ebe703b4f349b86efe9dcbd3be1d3e15e
                                          • Instruction Fuzzy Hash: E4213779A00240DFDB41CF98D5C0B16BFA5FB84714F24C67EE94A4B362C33AD806CAA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564994284.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14cd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a65d03f1845dd02e5a1f9c49bfda1b12e82888dfb6feeb0bb3f1e05516641cf8
                                          • Instruction ID: e707c40481998d5baab5202055b2703ff55476a8d7de2f251042f2c9b1111775
                                          • Opcode Fuzzy Hash: a65d03f1845dd02e5a1f9c49bfda1b12e82888dfb6feeb0bb3f1e05516641cf8
                                          • Instruction Fuzzy Hash: 48214F79904240DFDB41DF94D4C0B26BB66FB84724F20C57EE8094B356C73AD806C7A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564942032.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14bd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                          • Instruction ID: 3a79b23383482ceffffa206405edb5d81ebaa63f350b3341a4e84f3d6d976b2b
                                          • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                          • Instruction Fuzzy Hash: 4B11B176904280DFDB16CF54D5C4B56BF72FB84328F2886AAD8490B626C33AD456CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564942032.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14bd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                          • Instruction ID: 134c516e33c99e2b5bac2b59d9cec04b91ba732510b78547b22461eaf94ff43d
                                          • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                          • Instruction Fuzzy Hash: B211B476904280DFDB16CF54D5C4B56BF72FB84328F24C6AAD8444B626C33AD456CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564994284.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14cd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                          • Instruction ID: a4c877289cd5af996a13bfb5966ed551f2d8f897d5efe4f49ceb7718a08cba44
                                          • Opcode Fuzzy Hash: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                          • Instruction Fuzzy Hash: F9118E79904280DFDB12CF54D5C4B16BB72FB88724F24C6AED8494B766C33AD44ACB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564994284.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14cd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                          • Instruction ID: 08c9c29e49ae8172ea5b1c3702b8173728ec083027c9c02089f8b55e8f4c9907
                                          • Opcode Fuzzy Hash: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                          • Instruction Fuzzy Hash: 6B11BE79904280DFDB02CF18D5C0B16BB61FB84724F24C6AED8494B766C33AD44ACBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564942032.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14bd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 269813358e642754c63948280b913e96b60d572c7f4d6491125dbf6fba9a1892
                                          • Instruction ID: c1e370bc9d0032a692ff84991c22c4d74254dac9e6373026b9ccec514407a76d
                                          • Opcode Fuzzy Hash: 269813358e642754c63948280b913e96b60d572c7f4d6491125dbf6fba9a1892
                                          • Instruction Fuzzy Hash: 3201F2719083849AE7109A69CCC4BE7BF98EF54338F18849BEE4C1B352D37D9841CAB1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.564942032.00000000014BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014BD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_14bd000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52da358081f7e5a82ca356eaf7bc9c620005ba22a246a3eb17517bfe7fa67336
                                          • Instruction ID: fc0356a359dda33741ad57707a95b8ca0bf98ff275517e7c9738debe50931d60
                                          • Opcode Fuzzy Hash: 52da358081f7e5a82ca356eaf7bc9c620005ba22a246a3eb17517bfe7fa67336
                                          • Instruction Fuzzy Hash: BBF0C2728042849BE7118A0ACDC4BA3FF98EB40338F18C59BED4C5F392C3789844CAB1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: `.
                                          • API String ID: 0-2943270798
                                          • Opcode ID: df3a8c099b947456823f1fb8dda66cfee9a7843cd9b3a0c8fc8ccc6120c2d9f3
                                          • Instruction ID: 3589477db9a686b5ae51341cc71246b49b90b61ab8408067e11430d61f2b7d83
                                          • Opcode Fuzzy Hash: df3a8c099b947456823f1fb8dda66cfee9a7843cd9b3a0c8fc8ccc6120c2d9f3
                                          • Instruction Fuzzy Hash: 8DF15B74E002598FDB14DFA9D584AAEFBB2FF89300F248169D915AB355CB34AD42CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c403d9b6d1b3d2b0d63257fc5785789262875ef5ee3bdbbf3404b46722889aad
                                          • Instruction ID: c0a8c4b711ead201e9a987160c41e4e436bf08928d59aab7444798db32e263c6
                                          • Opcode Fuzzy Hash: c403d9b6d1b3d2b0d63257fc5785789262875ef5ee3bdbbf3404b46722889aad
                                          • Instruction Fuzzy Hash: A2E15C74E002598FDB14DFA9C994AAEFBB2FF88300F248269D515AB355DB34AD41CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e0f426b9d6061f4f30aba42c2df4a7e63b9f27a6719589fbfc4e1a8666a13bf
                                          • Instruction ID: 0567fd8b34a24fff476fee4350868a731d6494cda2caefa7c8578c42dbd66ba8
                                          • Opcode Fuzzy Hash: 3e0f426b9d6061f4f30aba42c2df4a7e63b9f27a6719589fbfc4e1a8666a13bf
                                          • Instruction Fuzzy Hash: DDE14A74E1025A8FDB14DFA9C9859AEFBB2FF88300F248169D919AB355C730AD41CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3e9a703e0e2aa50e524f1a3865795bba3623d06ad926972dafa25d9bb93cf8f1
                                          • Instruction ID: a5e55c17ee57068eaf41a164a00cbf95d4b3bae467a403f9e0ae3640f9dacd97
                                          • Opcode Fuzzy Hash: 3e9a703e0e2aa50e524f1a3865795bba3623d06ad926972dafa25d9bb93cf8f1
                                          • Instruction Fuzzy Hash: 71E13874E0025A8FDB14DFA9D9949AEFBB2FF88300F248169D915AB355DB30AD41CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d4004c76fd2f9ac501c1016dfd55f11bc6f353556cc8d6aef052f016ba3ed30
                                          • Instruction ID: 52ff73f8c7587d8ef078494a9b8514c684430ca41f9538a5a4c1d882b6f87d46
                                          • Opcode Fuzzy Hash: 4d4004c76fd2f9ac501c1016dfd55f11bc6f353556cc8d6aef052f016ba3ed30
                                          • Instruction Fuzzy Hash: 72E139B4E0025A8FDB14DFA9C9849AEFBB2FF89301F288169D514A7355DB34AD41CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0e2ea74abb6428c5316c2ed2302472b9e0e781060b6fa0c2d998592d4a41b465
                                          • Instruction ID: ffb851652bf7837e9466a010a9f12222b34518ef065e0f3e3dd1473a33c2c697
                                          • Opcode Fuzzy Hash: 0e2ea74abb6428c5316c2ed2302472b9e0e781060b6fa0c2d998592d4a41b465
                                          • Instruction Fuzzy Hash: 37C15275E016598FDB58DF6AC944AD9BBF2BF89300F14C0EAD809AB364DA305E81CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cfc79aa48053e10ab9f189e9f2e116ea60eed24a64e77d1e295a0b5616c7dc99
                                          • Instruction ID: 29612fbc5e9dacd7031ca96148385be9234a65acd5888264381fcd9a2d1633db
                                          • Opcode Fuzzy Hash: cfc79aa48053e10ab9f189e9f2e116ea60eed24a64e77d1e295a0b5616c7dc99
                                          • Instruction Fuzzy Hash: 9A611C70A016898FDB48EFBBE89969EBFF2FF94300F14C529D1099B264DE745806CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.577706573.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_65e0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7aca1a528c289daf949de98323c8314639d95c4cb11940c5b8cbf5e608200a7c
                                          • Instruction ID: 4b97c90e95ae1be6407700cebec4edf11b4b814e5a1e959ec3954febcf91c992
                                          • Opcode Fuzzy Hash: 7aca1a528c289daf949de98323c8314639d95c4cb11940c5b8cbf5e608200a7c
                                          • Instruction Fuzzy Hash: EB610B70A016498FDB48EFBBE85969EBFF2FF94300F14C529D5089B264EE745806CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 640a14cb6fde1f8b9ba0d1f1b0641b8f0b09e6435e8ea1a8c0d71d2957b1f6e0
                                          • Instruction ID: bf5979dbf4f28702eaa812e110dadd16368d95a1465ed0930c1581b4fc451995
                                          • Opcode Fuzzy Hash: 640a14cb6fde1f8b9ba0d1f1b0641b8f0b09e6435e8ea1a8c0d71d2957b1f6e0
                                          • Instruction Fuzzy Hash: 5B4145B1D156588BEB5CCF6BDD4169AFAF3AFC9300F18C1FA850CAA224DB3149558F11
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 01b6936c577e32f9b4a14e6d08c51f6eaf7bc5ae68db39b9026dc8c069bec103
                                          • Instruction ID: df93f7a232fac01f228e82636a4b9722241431d5e6e8ae029fd9e2ea2cfdd292
                                          • Opcode Fuzzy Hash: 01b6936c577e32f9b4a14e6d08c51f6eaf7bc5ae68db39b9026dc8c069bec103
                                          • Instruction Fuzzy Hash: B73198B1D056288FEB28CF6B89153DABAF2AFC9304F04C5AAC50CA6254DB7509858F41
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlDecodePointer.NTDLL ref: 07FDA09C
                                          • RtlDecodePointer.NTDLL ref: 07FDA0DB
                                          • RtlEncodePointer.NTDLL(00000000), ref: 07FDA142
                                          • RtlDecodePointer.NTDLL(00000000), ref: 07FDA17E
                                          • RtlEncodePointer.NTDLL(00000000), ref: 07FDA1B8
                                          • RtlDecodePointer.NTDLL ref: 07FDA1F8
                                          • RtlDecodePointer.NTDLL ref: 07FDA236
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: Pointer$Decode$Encode
                                          • String ID:
                                          • API String ID: 1638560559-0
                                          • Opcode ID: ea3b27d2e758de85d2fe18e33093e75fed85647d1bb59739eec25c259f6e4fa2
                                          • Instruction ID: cdeedd90e5d43337c51aceeefa9b6cffd7438ea46f074c460f73a673cb12b898
                                          • Opcode Fuzzy Hash: ea3b27d2e758de85d2fe18e33093e75fed85647d1bb59739eec25c259f6e4fa2
                                          • Instruction Fuzzy Hash: DC6148B1C0035A8FDF219FAAC54C3DEBBF1EB18319F188919D46563690C3B91984DF96
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlDecodePointer.NTDLL ref: 07FDA09C
                                          • RtlDecodePointer.NTDLL ref: 07FDA0DB
                                          • RtlEncodePointer.NTDLL(00000000), ref: 07FDA142
                                          • RtlDecodePointer.NTDLL(00000000), ref: 07FDA17E
                                          • RtlEncodePointer.NTDLL(00000000), ref: 07FDA1B8
                                          • RtlDecodePointer.NTDLL ref: 07FDA1F8
                                          • RtlDecodePointer.NTDLL ref: 07FDA236
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.579230654.0000000007FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07FD0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7fd0000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: Pointer$Decode$Encode
                                          • String ID:
                                          • API String ID: 1638560559-0
                                          • Opcode ID: 13af8f2cd6e3ed86dc94a159c2b201f091e7c89bd59048c5477228a2a4a1f261
                                          • Instruction ID: 3d78c77955ed7ca50d0c5415cb9e67f292899902dc1e1b1c441b4dde155374f7
                                          • Opcode Fuzzy Hash: 13af8f2cd6e3ed86dc94a159c2b201f091e7c89bd59048c5477228a2a4a1f261
                                          • Instruction Fuzzy Hash: 48616AB0C0035A8FDF218FAAC54C3DEBFF1AB19319F188919D455A3690D3B90984DF96
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:15.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:3.5%
                                          Total number of Nodes:114
                                          Total number of Limit Nodes:7
                                          execution_graph 50135 d9d818 50136 d9d837 50135->50136 50137 d9d86b LdrInitializeThunk 50136->50137 50138 d9d888 50137->50138 50139 14915a8 50140 14915d7 50139->50140 50143 149130c 50140->50143 50142 14916fc 50144 1491317 50143->50144 50148 1493699 50144->50148 50157 14936a8 50144->50157 50145 1491c8a 50145->50142 50149 14936d2 50148->50149 50166 1492e6c 50149->50166 50152 1493750 50154 1493779 50152->50154 50175 1492e7c 50152->50175 50156 1492e6c GetModuleHandleW 50156->50152 50158 14936d2 50157->50158 50159 1492e6c GetModuleHandleW 50158->50159 50160 1493734 50159->50160 50164 1493b78 GetModuleHandleW 50160->50164 50165 1492e6c GetModuleHandleW 50160->50165 50161 1493750 50162 1492e7c GetModuleHandleW 50161->50162 50163 1493779 50161->50163 50162->50163 50164->50161 50165->50161 50167 1492e77 50166->50167 50168 1493734 50167->50168 50179 1493d82 50167->50179 50168->50156 50170 1493b78 50168->50170 50171 1493b93 50170->50171 50172 1493b97 50170->50172 50171->50152 50173 1493cce 50172->50173 50174 1493d82 GetModuleHandleW 50172->50174 50174->50173 50176 14940f0 GetModuleHandleW 50175->50176 50178 1494165 50176->50178 50178->50154 50180 1493da5 50179->50180 50181 1492e7c GetModuleHandleW 50180->50181 50182 1493dea 50180->50182 50181->50182 50183 1492e7c GetModuleHandleW 50182->50183 50188 1493fb6 50182->50188 50184 1493f3b 50183->50184 50185 1492e7c GetModuleHandleW 50184->50185 50184->50188 50186 1493f89 50185->50186 50187 1492e7c GetModuleHandleW 50186->50187 50186->50188 50187->50188 50188->50168 50189 1496ba8 DuplicateHandle 50190 1496c3e 50189->50190 50191 1495288 50192 14952ae 50191->50192 50195 14935dc 50192->50195 50196 14935e7 50195->50196 50197 1497c31 50196->50197 50200 1497c21 50196->50200 50211 14977cc 50197->50211 50199 1497c2f 50200->50199 50203 1497d48 50200->50203 50207 1497d58 50200->50207 50205 1497d66 50203->50205 50204 14977cc CallWindowProcW 50204->50205 50205->50204 50206 1497e4f 50205->50206 50206->50199 50209 1497d66 50207->50209 50208 14977cc CallWindowProcW 50208->50209 50209->50208 50210 1497e4f 50209->50210 50210->50199 50212 14977d7 50211->50212 50213 1497f1a CallWindowProcW 50212->50213 50214 1497ec9 50212->50214 50213->50214 50214->50199 50215 1496980 GetCurrentProcess 50216 14969fa GetCurrentThread 50215->50216 50217 14969f3 50215->50217 50218 1496a30 50216->50218 50219 1496a37 GetCurrentProcess 50216->50219 50217->50216 50218->50219 50220 1496a6d 50219->50220 50221 1496a95 GetCurrentThreadId 50220->50221 50222 1496ac6 50221->50222 50223 149ba60 50224 149ba74 50223->50224 50227 149bcaa 50224->50227 50233 149be8c 50227->50233 50238 149bea6 50227->50238 50243 149bd90 50227->50243 50248 149bd80 50227->50248 50234 149be3f 50233->50234 50235 149becb 50234->50235 50253 149c1d9 50234->50253 50261 149c188 50234->50261 50239 149beb9 50238->50239 50240 149becb 50238->50240 50241 149c1d9 2 API calls 50239->50241 50242 149c188 2 API calls 50239->50242 50241->50240 50242->50240 50244 149bdd4 50243->50244 50245 149becb 50244->50245 50246 149c1d9 2 API calls 50244->50246 50247 149c188 2 API calls 50244->50247 50246->50245 50247->50245 50249 149bd90 50248->50249 50250 149becb 50249->50250 50251 149c1d9 2 API calls 50249->50251 50252 149c188 2 API calls 50249->50252 50251->50250 50252->50250 50254 149c182 50253->50254 50257 149c1e2 50253->50257 50259 149c1d9 RtlEncodePointer 50254->50259 50266 149c1e8 50254->50266 50255 149c1b6 50255->50235 50256 149c275 50256->50235 50257->50256 50258 149c24c RtlEncodePointer 50257->50258 50258->50256 50259->50255 50262 149c1a6 50261->50262 50264 149c1d9 2 API calls 50262->50264 50265 149c1e8 RtlEncodePointer 50262->50265 50263 149c1b6 50263->50235 50264->50263 50265->50263 50267 149c222 50266->50267 50268 149c24c RtlEncodePointer 50267->50268 50269 149c275 50267->50269 50268->50269 50269->50255 50270 14950d0 50271 1495138 CreateWindowExW 50270->50271 50273 14951f4 50271->50273
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.800498280.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_d90000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 1be9049ff7bde06855260b376f851b608b670fe1f1febb07fcc81295e94696c9
                                          • Instruction ID: 03a7c252d365588148fe99d1861f76e851e63bdf6e2a7e956d024f6677768dc0
                                          • Opcode Fuzzy Hash: 1be9049ff7bde06855260b376f851b608b670fe1f1febb07fcc81295e94696c9
                                          • Instruction Fuzzy Hash: AE51AA71B0020A9FCF14FBB5D888AAEB7B6BF94304F148969E5029B255DF34D805CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 014969E0
                                          • GetCurrentThread.KERNEL32 ref: 01496A1D
                                          • GetCurrentProcess.KERNEL32 ref: 01496A5A
                                          • GetCurrentThreadId.KERNEL32 ref: 01496AB3
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 949a289cf63f8b864957328598f4adc6ff89730284e71765c87c00d6f2a70ed0
                                          • Instruction ID: 79a16cade64ebf48ae02b086d2c74643edd68585e4a9a5a098fb22f0bcbe9c82
                                          • Opcode Fuzzy Hash: 949a289cf63f8b864957328598f4adc6ff89730284e71765c87c00d6f2a70ed0
                                          • Instruction Fuzzy Hash: C95188B0D002888FDB15CFAAC688BDEBFF1EF59314F24859AE449A7361D7385844CB65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 014969E0
                                          • GetCurrentThread.KERNEL32 ref: 01496A1D
                                          • GetCurrentProcess.KERNEL32 ref: 01496A5A
                                          • GetCurrentThreadId.KERNEL32 ref: 01496AB3
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 23852d0e646c43f024dc356ccd2f9ae25490b4ac5c5a9d8d21a7da2d8bd237a2
                                          • Instruction ID: 676fa3f3b502a090304683c8c0b6b4ff37e4312bc0a06d058d709528438bcea8
                                          • Opcode Fuzzy Hash: 23852d0e646c43f024dc356ccd2f9ae25490b4ac5c5a9d8d21a7da2d8bd237a2
                                          • Instruction Fuzzy Hash: 2D5133B0D006498FDB14CFAAC648B9EBFF5EF48314F20855AE119A7360D7785884CB65
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1391 1350a84-1350ac0 1635 1350ac0 call 135e568 1391->1635 1636 1350ac0 call 135e558 1391->1636 1395 1350ac6-1350b05 1598 1350b05 call 135ef91 1395->1598 1599 1350b05 call 135eb20 1395->1599 1600 1350b05 call 135eb0f 1395->1600 1601 1350b05 call 135eb69 1395->1601 1602 1350b05 call 135ed49 1395->1602 1603 1350b05 call 135ebb8 1395->1603 1398 1350b0b-1350b4a 1607 1350b4a call 135ff27 1398->1607 1608 1350b4a call 135fad6 1398->1608 1609 1350b4a call 135f171 1398->1609 1610 1350b4a call 135f291 1398->1610 1611 1350b4a call 135f180 1398->1611 1612 1350b4a call 135f2a0 1398->1612 1613 1350b4a call 135fa28 1398->1613 1614 1350b4a call 135fec8 1398->1614 1401 1350b50-1350db7 1624 1350db7 call d90cd8 1401->1624 1625 1350db7 call d90cd4 1401->1625 1428 1350dbd-1350dfc 1629 1350dfc call d9a27f 1428->1629 1630 1350dfc call d9a290 1428->1630 1431 1350e02-1350e41 1637 1350e41 call d9a518 1431->1637 1638 1350e41 call d9a50d 1431->1638 1434 1350e47-1350e86 1604 1350e86 call d9bddf 1434->1604 1605 1350e86 call d9bd7e 1434->1605 1606 1350e86 call d9bd80 1434->1606 1437 1350e8c-1350f07 1615 1350f07 call d9bfd8 1437->1615 1616 1350f07 call d9bfcc 1437->1616 1617 1350f07 call d9c037 1437->1617 1443 1350f0d-1350f4c 1621 1350f4c call d9c099 1443->1621 1622 1350f4c call d9c0a8 1443->1622 1623 1350f4c call d9c157 1443->1623 1446 1350f52-1350f91 1626 1350f91 call d9c218 1446->1626 1627 1350f91 call d9c20c 1446->1627 1628 1350f91 call d9c277 1446->1628 1449 1350f97-1350fd6 1631 1350fd6 call d9c2d8 1449->1631 1632 1350fd6 call d9c2e8 1449->1632 1633 1350fd6 call d9d450 1449->1633 1634 1350fd6 call d9d440 1449->1634 1452 1350fdc-135101b 1595 135101b call d9d509 1452->1595 1596 135101b call d9d518 1452->1596 1597 135101b call d9d757 1452->1597 1455 1351021-13510f7 KiUserExceptionDispatcher 1618 13510f7 call d9daa8 1455->1618 1619 13510f7 call d9df5f 1455->1619 1620 13510f7 call d9daa6 1455->1620 1464 13510fd-1351146 1467 135114c-135116f 1464->1467 1468 135143f-1351450 1464->1468 1480 1351175-13511e7 1467->1480 1481 1351427-135143c 1467->1481 1471 1351456-135145f 1468->1471 1472 13517af-13517b7 1468->1472 1473 1351465-13514c5 1471->1473 1474 13514f6-13514f9 1471->1474 1475 13517bd-135182e 1472->1475 1476 1351839-1351843 1472->1476 1473->1472 1482 13514ff-1351644 1474->1482 1483 1351669-135166c 1474->1483 1475->1476 1478 1351845-1351882 1476->1478 1479 1351889-135189b 1476->1479 1478->1479 1512 13511ed-13511f5 1480->1512 1513 135140f-1351421 1480->1513 1495 135143d 1481->1495 1482->1472 1483->1472 1484 1351672-1351792 1483->1484 1484->1472 1495->1495 1516 135131e-135133d 1512->1516 1517 13511fb-1351319 1512->1517 1513->1480 1513->1481 1516->1513 1519 1351343-13513e6 1516->1519 1517->1513 1519->1513 1595->1455 1596->1455 1597->1455 1598->1398 1599->1398 1600->1398 1601->1398 1602->1398 1603->1398 1604->1437 1605->1437 1606->1437 1607->1401 1608->1401 1609->1401 1610->1401 1611->1401 1612->1401 1613->1401 1614->1401 1615->1443 1616->1443 1617->1443 1618->1464 1619->1464 1620->1464 1621->1446 1622->1446 1623->1446 1624->1428 1625->1428 1626->1449 1627->1449 1628->1449 1629->1431 1630->1431 1631->1452 1632->1452 1633->1452 1634->1452 1635->1395 1636->1395 1637->1434 1638->1434
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: f6feff081034094bf620f2a33421e2b45f74247d1c7d814173fc6c4c8450e091
                                          • Instruction ID: 7036a955ab6b5891a83b91bd9dbfa9eced49d06b730b8fc41f8cc926972ec746
                                          • Opcode Fuzzy Hash: f6feff081034094bf620f2a33421e2b45f74247d1c7d814173fc6c4c8450e091
                                          • Instruction Fuzzy Hash: DB420874A01269CFCB68EF24D958A9DBBB6BF88305F1041EAD40AA7350DF359E81CF54
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1639 1350aa5-1350ac0 1857 1350ac0 call 135e568 1639->1857 1858 1350ac0 call 135e558 1639->1858 1643 1350ac6-1350b05 1864 1350b05 call 135ef91 1643->1864 1865 1350b05 call 135eb20 1643->1865 1866 1350b05 call 135eb0f 1643->1866 1867 1350b05 call 135eb69 1643->1867 1868 1350b05 call 135ed49 1643->1868 1869 1350b05 call 135ebb8 1643->1869 1646 1350b0b-1350b4a 1873 1350b4a call 135ff27 1646->1873 1874 1350b4a call 135fad6 1646->1874 1875 1350b4a call 135f171 1646->1875 1876 1350b4a call 135f291 1646->1876 1877 1350b4a call 135f180 1646->1877 1878 1350b4a call 135f2a0 1646->1878 1879 1350b4a call 135fa28 1646->1879 1880 1350b4a call 135fec8 1646->1880 1649 1350b50-1350db7 1846 1350db7 call d90cd8 1649->1846 1847 1350db7 call d90cd4 1649->1847 1676 1350dbd-1350dfc 1851 1350dfc call d9a27f 1676->1851 1852 1350dfc call d9a290 1676->1852 1679 1350e02-1350e41 1859 1350e41 call d9a518 1679->1859 1860 1350e41 call d9a50d 1679->1860 1682 1350e47-1350e86 1870 1350e86 call d9bddf 1682->1870 1871 1350e86 call d9bd7e 1682->1871 1872 1350e86 call d9bd80 1682->1872 1685 1350e8c-1350f07 1881 1350f07 call d9bfd8 1685->1881 1882 1350f07 call d9bfcc 1685->1882 1883 1350f07 call d9c037 1685->1883 1691 1350f0d-1350f4c 1843 1350f4c call d9c099 1691->1843 1844 1350f4c call d9c0a8 1691->1844 1845 1350f4c call d9c157 1691->1845 1694 1350f52-1350f91 1848 1350f91 call d9c218 1694->1848 1849 1350f91 call d9c20c 1694->1849 1850 1350f91 call d9c277 1694->1850 1697 1350f97-1350fd6 1853 1350fd6 call d9c2d8 1697->1853 1854 1350fd6 call d9c2e8 1697->1854 1855 1350fd6 call d9d450 1697->1855 1856 1350fd6 call d9d440 1697->1856 1700 1350fdc-135101b 1861 135101b call d9d509 1700->1861 1862 135101b call d9d518 1700->1862 1863 135101b call d9d757 1700->1863 1703 1351021-13510f7 KiUserExceptionDispatcher 1884 13510f7 call d9daa8 1703->1884 1885 13510f7 call d9df5f 1703->1885 1886 13510f7 call d9daa6 1703->1886 1712 13510fd-1351146 1715 135114c-135116f 1712->1715 1716 135143f-1351450 1712->1716 1728 1351175-13511e7 1715->1728 1729 1351427-135143c 1715->1729 1719 1351456-135145f 1716->1719 1720 13517af-13517b7 1716->1720 1721 1351465-13514c5 1719->1721 1722 13514f6-13514f9 1719->1722 1723 13517bd-135182e 1720->1723 1724 1351839-1351843 1720->1724 1721->1720 1730 13514ff-1351644 1722->1730 1731 1351669-135166c 1722->1731 1723->1724 1726 1351845-1351882 1724->1726 1727 1351889-135189b 1724->1727 1726->1727 1760 13511ed-13511f5 1728->1760 1761 135140f-1351421 1728->1761 1743 135143d 1729->1743 1730->1720 1731->1720 1732 1351672-1351792 1731->1732 1732->1720 1743->1743 1764 135131e-135133d 1760->1764 1765 13511fb-1351319 1760->1765 1761->1728 1761->1729 1764->1761 1767 1351343-13513e6 1764->1767 1765->1761 1767->1761 1843->1694 1844->1694 1845->1694 1846->1676 1847->1676 1848->1697 1849->1697 1850->1697 1851->1679 1852->1679 1853->1700 1854->1700 1855->1700 1856->1700 1857->1643 1858->1643 1859->1682 1860->1682 1861->1703 1862->1703 1863->1703 1864->1646 1865->1646 1866->1646 1867->1646 1868->1646 1869->1646 1870->1685 1871->1685 1872->1685 1873->1649 1874->1649 1875->1649 1876->1649 1877->1649 1878->1649 1879->1649 1880->1649 1881->1691 1882->1691 1883->1691 1884->1712 1885->1712 1886->1712
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: eec95e4c5ad7404970ada50e8eafd1dbe0215c3f0394e1e1d7ab8ad4fe709998
                                          • Instruction ID: 3f8ee43f6aeef6381e7effc5a420a56af9e691735aaa09d6d01b8e74d9e2c920
                                          • Opcode Fuzzy Hash: eec95e4c5ad7404970ada50e8eafd1dbe0215c3f0394e1e1d7ab8ad4fe709998
                                          • Instruction Fuzzy Hash: 04E10974A0526DCFCBA8DF24C94865DB7B6BF45205F1042EAD80AA3310DF3A9E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1887 1350ae1-1350b05 2099 1350b05 call 135ef91 1887->2099 2100 1350b05 call 135eb20 1887->2100 2101 1350b05 call 135eb0f 1887->2101 2102 1350b05 call 135eb69 1887->2102 2103 1350b05 call 135ed49 1887->2103 2104 1350b05 call 135ebb8 1887->2104 1891 1350b0b-1350b4a 2108 1350b4a call 135ff27 1891->2108 2109 1350b4a call 135fad6 1891->2109 2110 1350b4a call 135f171 1891->2110 2111 1350b4a call 135f291 1891->2111 2112 1350b4a call 135f180 1891->2112 2113 1350b4a call 135f2a0 1891->2113 2114 1350b4a call 135fa28 1891->2114 2115 1350b4a call 135fec8 1891->2115 1894 1350b50-1350db7 2125 1350db7 call d90cd8 1894->2125 2126 1350db7 call d90cd4 1894->2126 1921 1350dbd-1350dfc 2088 1350dfc call d9a27f 1921->2088 2089 1350dfc call d9a290 1921->2089 1924 1350e02-1350e41 2094 1350e41 call d9a518 1924->2094 2095 1350e41 call d9a50d 1924->2095 1927 1350e47-1350e86 2105 1350e86 call d9bddf 1927->2105 2106 1350e86 call d9bd7e 1927->2106 2107 1350e86 call d9bd80 1927->2107 1930 1350e8c-1350f07 2116 1350f07 call d9bfd8 1930->2116 2117 1350f07 call d9bfcc 1930->2117 2118 1350f07 call d9c037 1930->2118 1936 1350f0d-1350f4c 2122 1350f4c call d9c099 1936->2122 2123 1350f4c call d9c0a8 1936->2123 2124 1350f4c call d9c157 1936->2124 1939 1350f52-1350f91 2127 1350f91 call d9c218 1939->2127 2128 1350f91 call d9c20c 1939->2128 2129 1350f91 call d9c277 1939->2129 1942 1350f97-1350fd6 2090 1350fd6 call d9c2d8 1942->2090 2091 1350fd6 call d9c2e8 1942->2091 2092 1350fd6 call d9d450 1942->2092 2093 1350fd6 call d9d440 1942->2093 1945 1350fdc-135101b 2096 135101b call d9d509 1945->2096 2097 135101b call d9d518 1945->2097 2098 135101b call d9d757 1945->2098 1948 1351021-13510f7 KiUserExceptionDispatcher 2119 13510f7 call d9daa8 1948->2119 2120 13510f7 call d9df5f 1948->2120 2121 13510f7 call d9daa6 1948->2121 1957 13510fd-1351146 1960 135114c-135116f 1957->1960 1961 135143f-1351450 1957->1961 1973 1351175-13511e7 1960->1973 1974 1351427-135143c 1960->1974 1964 1351456-135145f 1961->1964 1965 13517af-13517b7 1961->1965 1966 1351465-13514c5 1964->1966 1967 13514f6-13514f9 1964->1967 1968 13517bd-135182e 1965->1968 1969 1351839-1351843 1965->1969 1966->1965 1975 13514ff-1351644 1967->1975 1976 1351669-135166c 1967->1976 1968->1969 1971 1351845-1351882 1969->1971 1972 1351889-135189b 1969->1972 1971->1972 2005 13511ed-13511f5 1973->2005 2006 135140f-1351421 1973->2006 1988 135143d 1974->1988 1975->1965 1976->1965 1977 1351672-1351792 1976->1977 1977->1965 1988->1988 2009 135131e-135133d 2005->2009 2010 13511fb-1351319 2005->2010 2006->1973 2006->1974 2009->2006 2012 1351343-13513e6 2009->2012 2010->2006 2012->2006 2088->1924 2089->1924 2090->1945 2091->1945 2092->1945 2093->1945 2094->1927 2095->1927 2096->1948 2097->1948 2098->1948 2099->1891 2100->1891 2101->1891 2102->1891 2103->1891 2104->1891 2105->1930 2106->1930 2107->1930 2108->1894 2109->1894 2110->1894 2111->1894 2112->1894 2113->1894 2114->1894 2115->1894 2116->1936 2117->1936 2118->1936 2119->1957 2120->1957 2121->1957 2122->1939 2123->1939 2124->1939 2125->1921 2126->1921 2127->1942 2128->1942 2129->1942
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 01f569c82a9f313e9e07dbb045eb3e635502d0d1307779ebba3f5df80b6cc5eb
                                          • Instruction ID: bbb8703872cad0148e06a33d8b83cb4276f7a621109dd4d29cd5bfbe097e728d
                                          • Opcode Fuzzy Hash: 01f569c82a9f313e9e07dbb045eb3e635502d0d1307779ebba3f5df80b6cc5eb
                                          • Instruction Fuzzy Hash: 60E1F974A0526DCFCBA8DB24C94865DB7B6BF49205F1042EAD80AA3350DF3A9E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2130 1350b26-1350b4a 2347 1350b4a call 135ff27 2130->2347 2348 1350b4a call 135fad6 2130->2348 2349 1350b4a call 135f171 2130->2349 2350 1350b4a call 135f291 2130->2350 2351 1350b4a call 135f180 2130->2351 2352 1350b4a call 135f2a0 2130->2352 2353 1350b4a call 135fa28 2130->2353 2354 1350b4a call 135fec8 2130->2354 2134 1350b50-1350db7 2328 1350db7 call d90cd8 2134->2328 2329 1350db7 call d90cd4 2134->2329 2161 1350dbd-1350dfc 2333 1350dfc call d9a27f 2161->2333 2334 1350dfc call d9a290 2161->2334 2164 1350e02-1350e41 2339 1350e41 call d9a518 2164->2339 2340 1350e41 call d9a50d 2164->2340 2167 1350e47-1350e86 2344 1350e86 call d9bddf 2167->2344 2345 1350e86 call d9bd7e 2167->2345 2346 1350e86 call d9bd80 2167->2346 2170 1350e8c-1350f07 2355 1350f07 call d9bfd8 2170->2355 2356 1350f07 call d9bfcc 2170->2356 2357 1350f07 call d9c037 2170->2357 2176 1350f0d-1350f4c 2361 1350f4c call d9c099 2176->2361 2362 1350f4c call d9c0a8 2176->2362 2363 1350f4c call d9c157 2176->2363 2179 1350f52-1350f91 2330 1350f91 call d9c218 2179->2330 2331 1350f91 call d9c20c 2179->2331 2332 1350f91 call d9c277 2179->2332 2182 1350f97-1350fd6 2335 1350fd6 call d9c2d8 2182->2335 2336 1350fd6 call d9c2e8 2182->2336 2337 1350fd6 call d9d450 2182->2337 2338 1350fd6 call d9d440 2182->2338 2185 1350fdc-135101b 2341 135101b call d9d509 2185->2341 2342 135101b call d9d518 2185->2342 2343 135101b call d9d757 2185->2343 2188 1351021-13510f7 KiUserExceptionDispatcher 2358 13510f7 call d9daa8 2188->2358 2359 13510f7 call d9df5f 2188->2359 2360 13510f7 call d9daa6 2188->2360 2197 13510fd-1351146 2200 135114c-135116f 2197->2200 2201 135143f-1351450 2197->2201 2213 1351175-13511e7 2200->2213 2214 1351427-135143c 2200->2214 2204 1351456-135145f 2201->2204 2205 13517af-13517b7 2201->2205 2206 1351465-13514c5 2204->2206 2207 13514f6-13514f9 2204->2207 2208 13517bd-135182e 2205->2208 2209 1351839-1351843 2205->2209 2206->2205 2215 13514ff-1351644 2207->2215 2216 1351669-135166c 2207->2216 2208->2209 2211 1351845-1351882 2209->2211 2212 1351889-135189b 2209->2212 2211->2212 2245 13511ed-13511f5 2213->2245 2246 135140f-1351421 2213->2246 2228 135143d 2214->2228 2215->2205 2216->2205 2217 1351672-1351792 2216->2217 2217->2205 2228->2228 2249 135131e-135133d 2245->2249 2250 13511fb-1351319 2245->2250 2246->2213 2246->2214 2249->2246 2252 1351343-13513e6 2249->2252 2250->2246 2252->2246 2328->2161 2329->2161 2330->2182 2331->2182 2332->2182 2333->2164 2334->2164 2335->2185 2336->2185 2337->2185 2338->2185 2339->2167 2340->2167 2341->2188 2342->2188 2343->2188 2344->2170 2345->2170 2346->2170 2347->2134 2348->2134 2349->2134 2350->2134 2351->2134 2352->2134 2353->2134 2354->2134 2355->2176 2356->2176 2357->2176 2358->2197 2359->2197 2360->2197 2361->2179 2362->2179 2363->2179
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 222b78588c310cff0937ff67557119f9fdad7ce6a89ebb6b33b6aaf03feac827
                                          • Instruction ID: bb4f9df8163df56a01fcf571a3a9a66bf94014f357509ae4302e31b9226af640
                                          • Opcode Fuzzy Hash: 222b78588c310cff0937ff67557119f9fdad7ce6a89ebb6b33b6aaf03feac827
                                          • Instruction Fuzzy Hash: B6D10874A0526DCFCBA8DB24C94865DBBB6BF45205F1042EAD80AA3350DF3A9E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2364 1350b6b-1350db7 2559 1350db7 call d90cd8 2364->2559 2560 1350db7 call d90cd4 2364->2560 2392 1350dbd-1350dfc 2564 1350dfc call d9a27f 2392->2564 2565 1350dfc call d9a290 2392->2565 2395 1350e02-1350e41 2570 1350e41 call d9a518 2395->2570 2571 1350e41 call d9a50d 2395->2571 2398 1350e47-1350e86 2575 1350e86 call d9bddf 2398->2575 2576 1350e86 call d9bd7e 2398->2576 2577 1350e86 call d9bd80 2398->2577 2401 1350e8c-1350f07 2578 1350f07 call d9bfd8 2401->2578 2579 1350f07 call d9bfcc 2401->2579 2580 1350f07 call d9c037 2401->2580 2407 1350f0d-1350f4c 2584 1350f4c call d9c099 2407->2584 2585 1350f4c call d9c0a8 2407->2585 2586 1350f4c call d9c157 2407->2586 2410 1350f52-1350f91 2561 1350f91 call d9c218 2410->2561 2562 1350f91 call d9c20c 2410->2562 2563 1350f91 call d9c277 2410->2563 2413 1350f97-1350fd6 2566 1350fd6 call d9c2d8 2413->2566 2567 1350fd6 call d9c2e8 2413->2567 2568 1350fd6 call d9d450 2413->2568 2569 1350fd6 call d9d440 2413->2569 2416 1350fdc-135101b 2572 135101b call d9d509 2416->2572 2573 135101b call d9d518 2416->2573 2574 135101b call d9d757 2416->2574 2419 1351021-13510f7 KiUserExceptionDispatcher 2581 13510f7 call d9daa8 2419->2581 2582 13510f7 call d9df5f 2419->2582 2583 13510f7 call d9daa6 2419->2583 2428 13510fd-1351146 2431 135114c-135116f 2428->2431 2432 135143f-1351450 2428->2432 2444 1351175-13511e7 2431->2444 2445 1351427-135143c 2431->2445 2435 1351456-135145f 2432->2435 2436 13517af-13517b7 2432->2436 2437 1351465-13514c5 2435->2437 2438 13514f6-13514f9 2435->2438 2439 13517bd-135182e 2436->2439 2440 1351839-1351843 2436->2440 2437->2436 2446 13514ff-1351644 2438->2446 2447 1351669-135166c 2438->2447 2439->2440 2442 1351845-1351882 2440->2442 2443 1351889-135189b 2440->2443 2442->2443 2476 13511ed-13511f5 2444->2476 2477 135140f-1351421 2444->2477 2459 135143d 2445->2459 2446->2436 2447->2436 2448 1351672-1351792 2447->2448 2448->2436 2459->2459 2480 135131e-135133d 2476->2480 2481 13511fb-1351319 2476->2481 2477->2444 2477->2445 2480->2477 2483 1351343-13513e6 2480->2483 2481->2477 2483->2477 2559->2392 2560->2392 2561->2413 2562->2413 2563->2413 2564->2395 2565->2395 2566->2416 2567->2416 2568->2416 2569->2416 2570->2398 2571->2398 2572->2419 2573->2419 2574->2419 2575->2401 2576->2401 2577->2401 2578->2407 2579->2407 2580->2407 2581->2428 2582->2428 2583->2428 2584->2410 2585->2410 2586->2410
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 38900134f565d9669423d8127b89976e2c4449be978609ffab223f6935948ba2
                                          • Instruction ID: 3e34903765218471c550863ec36e0541051a7b4b5f020e71032bdf7c3e2ced0f
                                          • Opcode Fuzzy Hash: 38900134f565d9669423d8127b89976e2c4449be978609ffab223f6935948ba2
                                          • Instruction Fuzzy Hash: 76D11874A0526DCFCBA8EB24C94865DBBB6BF45305F1041EAD80AA3350DF3A9E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2587 1350bb0-1350db7 2788 1350db7 call d90cd8 2587->2788 2789 1350db7 call d90cd4 2587->2789 2612 1350dbd-1350dfc 2793 1350dfc call d9a27f 2612->2793 2794 1350dfc call d9a290 2612->2794 2615 1350e02-1350e41 2799 1350e41 call d9a518 2615->2799 2800 1350e41 call d9a50d 2615->2800 2618 1350e47-1350e86 2804 1350e86 call d9bddf 2618->2804 2805 1350e86 call d9bd7e 2618->2805 2806 1350e86 call d9bd80 2618->2806 2621 1350e8c-1350f07 2779 1350f07 call d9bfd8 2621->2779 2780 1350f07 call d9bfcc 2621->2780 2781 1350f07 call d9c037 2621->2781 2627 1350f0d-1350f4c 2785 1350f4c call d9c099 2627->2785 2786 1350f4c call d9c0a8 2627->2786 2787 1350f4c call d9c157 2627->2787 2630 1350f52-1350f91 2790 1350f91 call d9c218 2630->2790 2791 1350f91 call d9c20c 2630->2791 2792 1350f91 call d9c277 2630->2792 2633 1350f97-1350fd6 2795 1350fd6 call d9c2d8 2633->2795 2796 1350fd6 call d9c2e8 2633->2796 2797 1350fd6 call d9d450 2633->2797 2798 1350fd6 call d9d440 2633->2798 2636 1350fdc-135101b 2801 135101b call d9d509 2636->2801 2802 135101b call d9d518 2636->2802 2803 135101b call d9d757 2636->2803 2639 1351021-13510f7 KiUserExceptionDispatcher 2782 13510f7 call d9daa8 2639->2782 2783 13510f7 call d9df5f 2639->2783 2784 13510f7 call d9daa6 2639->2784 2648 13510fd-1351146 2651 135114c-135116f 2648->2651 2652 135143f-1351450 2648->2652 2664 1351175-13511e7 2651->2664 2665 1351427-135143c 2651->2665 2655 1351456-135145f 2652->2655 2656 13517af-13517b7 2652->2656 2657 1351465-13514c5 2655->2657 2658 13514f6-13514f9 2655->2658 2659 13517bd-135182e 2656->2659 2660 1351839-1351843 2656->2660 2657->2656 2666 13514ff-1351644 2658->2666 2667 1351669-135166c 2658->2667 2659->2660 2662 1351845-1351882 2660->2662 2663 1351889-135189b 2660->2663 2662->2663 2696 13511ed-13511f5 2664->2696 2697 135140f-1351421 2664->2697 2679 135143d 2665->2679 2666->2656 2667->2656 2668 1351672-1351792 2667->2668 2668->2656 2679->2679 2700 135131e-135133d 2696->2700 2701 13511fb-1351319 2696->2701 2697->2664 2697->2665 2700->2697 2703 1351343-13513e6 2700->2703 2701->2697 2703->2697 2779->2627 2780->2627 2781->2627 2782->2648 2783->2648 2784->2648 2785->2630 2786->2630 2787->2630 2788->2612 2789->2612 2790->2633 2791->2633 2792->2633 2793->2615 2794->2615 2795->2636 2796->2636 2797->2636 2798->2636 2799->2618 2800->2618 2801->2639 2802->2639 2803->2639 2804->2621 2805->2621 2806->2621
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 8f50bb74e8744d88daa9a9c8fd61d409cfa8f5c88f985136c416eae3a5fa0925
                                          • Instruction ID: 91694b33da3d324169f77ad89d9c1a752658dd488ca14d83d81b6faa209f34e1
                                          • Opcode Fuzzy Hash: 8f50bb74e8744d88daa9a9c8fd61d409cfa8f5c88f985136c416eae3a5fa0925
                                          • Instruction Fuzzy Hash: FDD11874A0526DCFCBA8EB24C94865DBBB6BF45205F1041EAD80AA3350DF3A9E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2807 1350bf5-1350db7 3022 1350db7 call d90cd8 2807->3022 3023 1350db7 call d90cd4 2807->3023 2829 1350dbd-1350dfc 2999 1350dfc call d9a27f 2829->2999 3000 1350dfc call d9a290 2829->3000 2832 1350e02-1350e41 3005 1350e41 call d9a518 2832->3005 3006 1350e41 call d9a50d 2832->3006 2835 1350e47-1350e86 3010 1350e86 call d9bddf 2835->3010 3011 1350e86 call d9bd7e 2835->3011 3012 1350e86 call d9bd80 2835->3012 2838 1350e8c-1350f07 3013 1350f07 call d9bfd8 2838->3013 3014 1350f07 call d9bfcc 2838->3014 3015 1350f07 call d9c037 2838->3015 2844 1350f0d-1350f4c 3019 1350f4c call d9c099 2844->3019 3020 1350f4c call d9c0a8 2844->3020 3021 1350f4c call d9c157 2844->3021 2847 1350f52-1350f91 2996 1350f91 call d9c218 2847->2996 2997 1350f91 call d9c20c 2847->2997 2998 1350f91 call d9c277 2847->2998 2850 1350f97-1350fd6 3001 1350fd6 call d9c2d8 2850->3001 3002 1350fd6 call d9c2e8 2850->3002 3003 1350fd6 call d9d450 2850->3003 3004 1350fd6 call d9d440 2850->3004 2853 1350fdc-135101b 3007 135101b call d9d509 2853->3007 3008 135101b call d9d518 2853->3008 3009 135101b call d9d757 2853->3009 2856 1351021-13510f7 KiUserExceptionDispatcher 3016 13510f7 call d9daa8 2856->3016 3017 13510f7 call d9df5f 2856->3017 3018 13510f7 call d9daa6 2856->3018 2865 13510fd-1351146 2868 135114c-135116f 2865->2868 2869 135143f-1351450 2865->2869 2881 1351175-13511e7 2868->2881 2882 1351427-135143c 2868->2882 2872 1351456-135145f 2869->2872 2873 13517af-13517b7 2869->2873 2874 1351465-13514c5 2872->2874 2875 13514f6-13514f9 2872->2875 2876 13517bd-135182e 2873->2876 2877 1351839-1351843 2873->2877 2874->2873 2883 13514ff-1351644 2875->2883 2884 1351669-135166c 2875->2884 2876->2877 2879 1351845-1351882 2877->2879 2880 1351889-135189b 2877->2880 2879->2880 2913 13511ed-13511f5 2881->2913 2914 135140f-1351421 2881->2914 2896 135143d 2882->2896 2883->2873 2884->2873 2885 1351672-1351792 2884->2885 2885->2873 2896->2896 2917 135131e-135133d 2913->2917 2918 13511fb-1351319 2913->2918 2914->2881 2914->2882 2917->2914 2920 1351343-13513e6 2917->2920 2918->2914 2920->2914 2996->2850 2997->2850 2998->2850 2999->2832 3000->2832 3001->2853 3002->2853 3003->2853 3004->2853 3005->2835 3006->2835 3007->2856 3008->2856 3009->2856 3010->2838 3011->2838 3012->2838 3013->2844 3014->2844 3015->2844 3016->2865 3017->2865 3018->2865 3019->2847 3020->2847 3021->2847 3022->2829 3023->2829
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 5f2f9a134c6249ac2ee665060a9d19ac0cab824f6811ac8bd80b2839fb8243d9
                                          • Instruction ID: ae67d79b6fe6dc2dd458d28d6ebc1541b059b687db9a0326809c42617b6e23de
                                          • Opcode Fuzzy Hash: 5f2f9a134c6249ac2ee665060a9d19ac0cab824f6811ac8bd80b2839fb8243d9
                                          • Instruction Fuzzy Hash: A6C11974A0526DCFCBA8DB24C85865DBBB6BF49205F1081EAD80AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3024 1350c3a-1350db7 3219 1350db7 call d90cd8 3024->3219 3220 1350db7 call d90cd4 3024->3220 3043 1350dbd-1350dfc 3224 1350dfc call d9a27f 3043->3224 3225 1350dfc call d9a290 3043->3225 3046 1350e02-1350e41 3230 1350e41 call d9a518 3046->3230 3231 1350e41 call d9a50d 3046->3231 3049 1350e47-1350e86 3235 1350e86 call d9bddf 3049->3235 3236 1350e86 call d9bd7e 3049->3236 3237 1350e86 call d9bd80 3049->3237 3052 1350e8c-1350f07 3210 1350f07 call d9bfd8 3052->3210 3211 1350f07 call d9bfcc 3052->3211 3212 1350f07 call d9c037 3052->3212 3058 1350f0d-1350f4c 3216 1350f4c call d9c099 3058->3216 3217 1350f4c call d9c0a8 3058->3217 3218 1350f4c call d9c157 3058->3218 3061 1350f52-1350f91 3221 1350f91 call d9c218 3061->3221 3222 1350f91 call d9c20c 3061->3222 3223 1350f91 call d9c277 3061->3223 3064 1350f97-1350fd6 3226 1350fd6 call d9c2d8 3064->3226 3227 1350fd6 call d9c2e8 3064->3227 3228 1350fd6 call d9d450 3064->3228 3229 1350fd6 call d9d440 3064->3229 3067 1350fdc-135101b 3232 135101b call d9d509 3067->3232 3233 135101b call d9d518 3067->3233 3234 135101b call d9d757 3067->3234 3070 1351021-13510f7 KiUserExceptionDispatcher 3213 13510f7 call d9daa8 3070->3213 3214 13510f7 call d9df5f 3070->3214 3215 13510f7 call d9daa6 3070->3215 3079 13510fd-1351146 3082 135114c-135116f 3079->3082 3083 135143f-1351450 3079->3083 3095 1351175-13511e7 3082->3095 3096 1351427-135143c 3082->3096 3086 1351456-135145f 3083->3086 3087 13517af-13517b7 3083->3087 3088 1351465-13514c5 3086->3088 3089 13514f6-13514f9 3086->3089 3090 13517bd-135182e 3087->3090 3091 1351839-1351843 3087->3091 3088->3087 3097 13514ff-1351644 3089->3097 3098 1351669-135166c 3089->3098 3090->3091 3093 1351845-1351882 3091->3093 3094 1351889-135189b 3091->3094 3093->3094 3127 13511ed-13511f5 3095->3127 3128 135140f-1351421 3095->3128 3110 135143d 3096->3110 3097->3087 3098->3087 3099 1351672-1351792 3098->3099 3099->3087 3110->3110 3131 135131e-135133d 3127->3131 3132 13511fb-1351319 3127->3132 3128->3095 3128->3096 3131->3128 3134 1351343-13513e6 3131->3134 3132->3128 3134->3128 3210->3058 3211->3058 3212->3058 3213->3079 3214->3079 3215->3079 3216->3061 3217->3061 3218->3061 3219->3043 3220->3043 3221->3064 3222->3064 3223->3064 3224->3046 3225->3046 3226->3067 3227->3067 3228->3067 3229->3067 3230->3049 3231->3049 3232->3070 3233->3070 3234->3070 3235->3052 3236->3052 3237->3052
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 74e53a6ea525004690302a51a88182cf3091e2b1f4041562c1ee9321fe592327
                                          • Instruction ID: a7ba3e5f695506324026ecb03d61230d0dd8bdaa071a2e3c74ab6d4fc1ac8f75
                                          • Opcode Fuzzy Hash: 74e53a6ea525004690302a51a88182cf3091e2b1f4041562c1ee9321fe592327
                                          • Instruction Fuzzy Hash: A6C12A74A0526DCFCBA8EB24C85865DBBB6BF45305F1081EAD80AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3238 1350c7f-1350db7 3442 1350db7 call d90cd8 3238->3442 3443 1350db7 call d90cd4 3238->3443 3254 1350dbd-1350dfc 3447 1350dfc call d9a27f 3254->3447 3448 1350dfc call d9a290 3254->3448 3257 1350e02-1350e41 3425 1350e41 call d9a518 3257->3425 3426 1350e41 call d9a50d 3257->3426 3260 1350e47-1350e86 3430 1350e86 call d9bddf 3260->3430 3431 1350e86 call d9bd7e 3260->3431 3432 1350e86 call d9bd80 3260->3432 3263 1350e8c-1350f07 3433 1350f07 call d9bfd8 3263->3433 3434 1350f07 call d9bfcc 3263->3434 3435 1350f07 call d9c037 3263->3435 3269 1350f0d-1350f4c 3439 1350f4c call d9c099 3269->3439 3440 1350f4c call d9c0a8 3269->3440 3441 1350f4c call d9c157 3269->3441 3272 1350f52-1350f91 3444 1350f91 call d9c218 3272->3444 3445 1350f91 call d9c20c 3272->3445 3446 1350f91 call d9c277 3272->3446 3275 1350f97-1350fd6 3421 1350fd6 call d9c2d8 3275->3421 3422 1350fd6 call d9c2e8 3275->3422 3423 1350fd6 call d9d450 3275->3423 3424 1350fd6 call d9d440 3275->3424 3278 1350fdc-135101b 3427 135101b call d9d509 3278->3427 3428 135101b call d9d518 3278->3428 3429 135101b call d9d757 3278->3429 3281 1351021-13510f7 KiUserExceptionDispatcher 3436 13510f7 call d9daa8 3281->3436 3437 13510f7 call d9df5f 3281->3437 3438 13510f7 call d9daa6 3281->3438 3290 13510fd-1351146 3293 135114c-135116f 3290->3293 3294 135143f-1351450 3290->3294 3306 1351175-13511e7 3293->3306 3307 1351427-135143c 3293->3307 3297 1351456-135145f 3294->3297 3298 13517af-13517b7 3294->3298 3299 1351465-13514c5 3297->3299 3300 13514f6-13514f9 3297->3300 3301 13517bd-135182e 3298->3301 3302 1351839-1351843 3298->3302 3299->3298 3308 13514ff-1351644 3300->3308 3309 1351669-135166c 3300->3309 3301->3302 3304 1351845-1351882 3302->3304 3305 1351889-135189b 3302->3305 3304->3305 3338 13511ed-13511f5 3306->3338 3339 135140f-1351421 3306->3339 3321 135143d 3307->3321 3308->3298 3309->3298 3310 1351672-1351792 3309->3310 3310->3298 3321->3321 3342 135131e-135133d 3338->3342 3343 13511fb-1351319 3338->3343 3339->3306 3339->3307 3342->3339 3345 1351343-13513e6 3342->3345 3343->3339 3345->3339 3421->3278 3422->3278 3423->3278 3424->3278 3425->3260 3426->3260 3427->3281 3428->3281 3429->3281 3430->3263 3431->3263 3432->3263 3433->3269 3434->3269 3435->3269 3436->3290 3437->3290 3438->3290 3439->3272 3440->3272 3441->3272 3442->3254 3443->3254 3444->3275 3445->3275 3446->3275 3447->3257 3448->3257
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 574e117c63c70d7621a8d988212438384b984fc9c2b1b6ee9c810c72f42e544b
                                          • Instruction ID: d8124aa916bfd92b4de479f96e2c2c43110b7ba3b976ce8001a9b2fde73e0127
                                          • Opcode Fuzzy Hash: 574e117c63c70d7621a8d988212438384b984fc9c2b1b6ee9c810c72f42e544b
                                          • Instruction Fuzzy Hash: 8CC12974A0526DCFCBA8EB24C948A5DBBB6BF45205F1081EAD40AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3449 1350cc4-1350db7 3650 1350db7 call d90cd8 3449->3650 3651 1350db7 call d90cd4 3449->3651 3462 1350dbd-1350dfc 3655 1350dfc call d9a27f 3462->3655 3656 1350dfc call d9a290 3462->3656 3465 1350e02-1350e41 3633 1350e41 call d9a518 3465->3633 3634 1350e41 call d9a50d 3465->3634 3468 1350e47-1350e86 3638 1350e86 call d9bddf 3468->3638 3639 1350e86 call d9bd7e 3468->3639 3640 1350e86 call d9bd80 3468->3640 3471 1350e8c-1350f07 3641 1350f07 call d9bfd8 3471->3641 3642 1350f07 call d9bfcc 3471->3642 3643 1350f07 call d9c037 3471->3643 3477 1350f0d-1350f4c 3647 1350f4c call d9c099 3477->3647 3648 1350f4c call d9c0a8 3477->3648 3649 1350f4c call d9c157 3477->3649 3480 1350f52-1350f91 3652 1350f91 call d9c218 3480->3652 3653 1350f91 call d9c20c 3480->3653 3654 1350f91 call d9c277 3480->3654 3483 1350f97-1350fd6 3629 1350fd6 call d9c2d8 3483->3629 3630 1350fd6 call d9c2e8 3483->3630 3631 1350fd6 call d9d450 3483->3631 3632 1350fd6 call d9d440 3483->3632 3486 1350fdc-135101b 3635 135101b call d9d509 3486->3635 3636 135101b call d9d518 3486->3636 3637 135101b call d9d757 3486->3637 3489 1351021-13510f7 KiUserExceptionDispatcher 3644 13510f7 call d9daa8 3489->3644 3645 13510f7 call d9df5f 3489->3645 3646 13510f7 call d9daa6 3489->3646 3498 13510fd-1351146 3501 135114c-135116f 3498->3501 3502 135143f-1351450 3498->3502 3514 1351175-13511e7 3501->3514 3515 1351427-135143c 3501->3515 3505 1351456-135145f 3502->3505 3506 13517af-13517b7 3502->3506 3507 1351465-13514c5 3505->3507 3508 13514f6-13514f9 3505->3508 3509 13517bd-135182e 3506->3509 3510 1351839-1351843 3506->3510 3507->3506 3516 13514ff-1351644 3508->3516 3517 1351669-135166c 3508->3517 3509->3510 3512 1351845-1351882 3510->3512 3513 1351889-135189b 3510->3513 3512->3513 3546 13511ed-13511f5 3514->3546 3547 135140f-1351421 3514->3547 3529 135143d 3515->3529 3516->3506 3517->3506 3518 1351672-1351792 3517->3518 3518->3506 3529->3529 3550 135131e-135133d 3546->3550 3551 13511fb-1351319 3546->3551 3547->3514 3547->3515 3550->3547 3553 1351343-13513e6 3550->3553 3551->3547 3553->3547 3629->3486 3630->3486 3631->3486 3632->3486 3633->3468 3634->3468 3635->3489 3636->3489 3637->3489 3638->3471 3639->3471 3640->3471 3641->3477 3642->3477 3643->3477 3644->3498 3645->3498 3646->3498 3647->3480 3648->3480 3649->3480 3650->3462 3651->3462 3652->3483 3653->3483 3654->3483 3655->3465 3656->3465
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 90ccfe7bb1bd7a0a9d41ad5b7aec11db86dc59d2ffb7897b0d568a1063081e2e
                                          • Instruction ID: 5dc1c6395642f861154aa7615f368941c34a56e4a0baf0e760e9541000a8600a
                                          • Opcode Fuzzy Hash: 90ccfe7bb1bd7a0a9d41ad5b7aec11db86dc59d2ffb7897b0d568a1063081e2e
                                          • Instruction Fuzzy Hash: DFB12A74A0526DCFCBA8EB24C958B5DBBB6BF44205F1081EAD40AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3657 1350d09-1350db7 3857 1350db7 call d90cd8 3657->3857 3858 1350db7 call d90cd4 3657->3858 3667 1350dbd-1350dfc 3834 1350dfc call d9a27f 3667->3834 3835 1350dfc call d9a290 3667->3835 3670 1350e02-1350e41 3840 1350e41 call d9a518 3670->3840 3841 1350e41 call d9a50d 3670->3841 3673 1350e47-1350e86 3845 1350e86 call d9bddf 3673->3845 3846 1350e86 call d9bd7e 3673->3846 3847 1350e86 call d9bd80 3673->3847 3676 1350e8c-1350f07 3848 1350f07 call d9bfd8 3676->3848 3849 1350f07 call d9bfcc 3676->3849 3850 1350f07 call d9c037 3676->3850 3682 1350f0d-1350f4c 3854 1350f4c call d9c099 3682->3854 3855 1350f4c call d9c0a8 3682->3855 3856 1350f4c call d9c157 3682->3856 3685 1350f52-1350f91 3859 1350f91 call d9c218 3685->3859 3860 1350f91 call d9c20c 3685->3860 3861 1350f91 call d9c277 3685->3861 3688 1350f97-1350fd6 3836 1350fd6 call d9c2d8 3688->3836 3837 1350fd6 call d9c2e8 3688->3837 3838 1350fd6 call d9d450 3688->3838 3839 1350fd6 call d9d440 3688->3839 3691 1350fdc-135101b 3842 135101b call d9d509 3691->3842 3843 135101b call d9d518 3691->3843 3844 135101b call d9d757 3691->3844 3694 1351021-13510f7 KiUserExceptionDispatcher 3851 13510f7 call d9daa8 3694->3851 3852 13510f7 call d9df5f 3694->3852 3853 13510f7 call d9daa6 3694->3853 3703 13510fd-1351146 3706 135114c-135116f 3703->3706 3707 135143f-1351450 3703->3707 3719 1351175-13511e7 3706->3719 3720 1351427-135143c 3706->3720 3710 1351456-135145f 3707->3710 3711 13517af-13517b7 3707->3711 3712 1351465-13514c5 3710->3712 3713 13514f6-13514f9 3710->3713 3714 13517bd-135182e 3711->3714 3715 1351839-1351843 3711->3715 3712->3711 3721 13514ff-1351644 3713->3721 3722 1351669-135166c 3713->3722 3714->3715 3717 1351845-1351882 3715->3717 3718 1351889-135189b 3715->3718 3717->3718 3751 13511ed-13511f5 3719->3751 3752 135140f-1351421 3719->3752 3734 135143d 3720->3734 3721->3711 3722->3711 3723 1351672-1351792 3722->3723 3723->3711 3734->3734 3755 135131e-135133d 3751->3755 3756 13511fb-1351319 3751->3756 3752->3719 3752->3720 3755->3752 3758 1351343-13513e6 3755->3758 3756->3752 3758->3752 3834->3670 3835->3670 3836->3691 3837->3691 3838->3691 3839->3691 3840->3673 3841->3673 3842->3694 3843->3694 3844->3694 3845->3676 3846->3676 3847->3676 3848->3682 3849->3682 3850->3682 3851->3703 3852->3703 3853->3703 3854->3685 3855->3685 3856->3685 3857->3667 3858->3667 3859->3688 3860->3688 3861->3688
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 5db6608b75617998ef3b69ec42973bb4b1ccff555efe54d76e84a9b951074cc2
                                          • Instruction ID: e71a0fa575434a23536e7d7cf74ff2743319d5e2b58fb58003582251c3aef4a1
                                          • Opcode Fuzzy Hash: 5db6608b75617998ef3b69ec42973bb4b1ccff555efe54d76e84a9b951074cc2
                                          • Instruction Fuzzy Hash: 44B12B74A01269CFCBA8DF24C95875DBBB6BF44205F1081EAD40AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3862 1350d4e-1350db7 4053 1350db7 call d90cd8 3862->4053 4054 1350db7 call d90cd4 3862->4054 3869 1350dbd-1350dfc 4058 1350dfc call d9a27f 3869->4058 4059 1350dfc call d9a290 3869->4059 3872 1350e02-1350e41 4036 1350e41 call d9a518 3872->4036 4037 1350e41 call d9a50d 3872->4037 3875 1350e47-1350e86 4041 1350e86 call d9bddf 3875->4041 4042 1350e86 call d9bd7e 3875->4042 4043 1350e86 call d9bd80 3875->4043 3878 1350e8c-1350f07 4044 1350f07 call d9bfd8 3878->4044 4045 1350f07 call d9bfcc 3878->4045 4046 1350f07 call d9c037 3878->4046 3884 1350f0d-1350f4c 4050 1350f4c call d9c099 3884->4050 4051 1350f4c call d9c0a8 3884->4051 4052 1350f4c call d9c157 3884->4052 3887 1350f52-1350f91 4055 1350f91 call d9c218 3887->4055 4056 1350f91 call d9c20c 3887->4056 4057 1350f91 call d9c277 3887->4057 3890 1350f97-1350fd6 4060 1350fd6 call d9c2d8 3890->4060 4061 1350fd6 call d9c2e8 3890->4061 4062 1350fd6 call d9d450 3890->4062 4063 1350fd6 call d9d440 3890->4063 3893 1350fdc-135101b 4038 135101b call d9d509 3893->4038 4039 135101b call d9d518 3893->4039 4040 135101b call d9d757 3893->4040 3896 1351021-13510f7 KiUserExceptionDispatcher 4047 13510f7 call d9daa8 3896->4047 4048 13510f7 call d9df5f 3896->4048 4049 13510f7 call d9daa6 3896->4049 3905 13510fd-1351146 3908 135114c-135116f 3905->3908 3909 135143f-1351450 3905->3909 3921 1351175-13511e7 3908->3921 3922 1351427-135143c 3908->3922 3912 1351456-135145f 3909->3912 3913 13517af-13517b7 3909->3913 3914 1351465-13514c5 3912->3914 3915 13514f6-13514f9 3912->3915 3916 13517bd-135182e 3913->3916 3917 1351839-1351843 3913->3917 3914->3913 3923 13514ff-1351644 3915->3923 3924 1351669-135166c 3915->3924 3916->3917 3919 1351845-1351882 3917->3919 3920 1351889-135189b 3917->3920 3919->3920 3953 13511ed-13511f5 3921->3953 3954 135140f-1351421 3921->3954 3936 135143d 3922->3936 3923->3913 3924->3913 3925 1351672-1351792 3924->3925 3925->3913 3936->3936 3957 135131e-135133d 3953->3957 3958 13511fb-1351319 3953->3958 3954->3921 3954->3922 3957->3954 3960 1351343-13513e6 3957->3960 3958->3954 3960->3954 4036->3875 4037->3875 4038->3896 4039->3896 4040->3896 4041->3878 4042->3878 4043->3878 4044->3884 4045->3884 4046->3884 4047->3905 4048->3905 4049->3905 4050->3887 4051->3887 4052->3887 4053->3869 4054->3869 4055->3890 4056->3890 4057->3890 4058->3872 4059->3872 4060->3893 4061->3893 4062->3893 4063->3893
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 07214bdcf745d112c9da4fde3150d081a1f69be4db94bff8264f7eb779b0b9ec
                                          • Instruction ID: 3d71746fa2350e46e137432e1215e59de8466b1cca242ef17f92801335744f8b
                                          • Opcode Fuzzy Hash: 07214bdcf745d112c9da4fde3150d081a1f69be4db94bff8264f7eb779b0b9ec
                                          • Instruction Fuzzy Hash: 9FB11A74A01269CFCBA8EB24C95875DBBB6BF85205F1081EAD40AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 4064 1350d93-1350db7 4250 1350db7 call d90cd8 4064->4250 4251 1350db7 call d90cd4 4064->4251 4068 1350dbd-1350dfc 4255 1350dfc call d9a27f 4068->4255 4256 1350dfc call d9a290 4068->4256 4071 1350e02-1350e41 4261 1350e41 call d9a518 4071->4261 4262 1350e41 call d9a50d 4071->4262 4074 1350e47-1350e86 4238 1350e86 call d9bddf 4074->4238 4239 1350e86 call d9bd7e 4074->4239 4240 1350e86 call d9bd80 4074->4240 4077 1350e8c-1350f07 4241 1350f07 call d9bfd8 4077->4241 4242 1350f07 call d9bfcc 4077->4242 4243 1350f07 call d9c037 4077->4243 4083 1350f0d-1350f4c 4247 1350f4c call d9c099 4083->4247 4248 1350f4c call d9c0a8 4083->4248 4249 1350f4c call d9c157 4083->4249 4086 1350f52-1350f91 4252 1350f91 call d9c218 4086->4252 4253 1350f91 call d9c20c 4086->4253 4254 1350f91 call d9c277 4086->4254 4089 1350f97-1350fd6 4257 1350fd6 call d9c2d8 4089->4257 4258 1350fd6 call d9c2e8 4089->4258 4259 1350fd6 call d9d450 4089->4259 4260 1350fd6 call d9d440 4089->4260 4092 1350fdc-135101b 4235 135101b call d9d509 4092->4235 4236 135101b call d9d518 4092->4236 4237 135101b call d9d757 4092->4237 4095 1351021-13510f7 KiUserExceptionDispatcher 4244 13510f7 call d9daa8 4095->4244 4245 13510f7 call d9df5f 4095->4245 4246 13510f7 call d9daa6 4095->4246 4104 13510fd-1351146 4107 135114c-135116f 4104->4107 4108 135143f-1351450 4104->4108 4120 1351175-13511e7 4107->4120 4121 1351427-135143c 4107->4121 4111 1351456-135145f 4108->4111 4112 13517af-13517b7 4108->4112 4113 1351465-13514c5 4111->4113 4114 13514f6-13514f9 4111->4114 4115 13517bd-135182e 4112->4115 4116 1351839-1351843 4112->4116 4113->4112 4122 13514ff-1351644 4114->4122 4123 1351669-135166c 4114->4123 4115->4116 4118 1351845-1351882 4116->4118 4119 1351889-135189b 4116->4119 4118->4119 4152 13511ed-13511f5 4120->4152 4153 135140f-1351421 4120->4153 4135 135143d 4121->4135 4122->4112 4123->4112 4124 1351672-1351792 4123->4124 4124->4112 4135->4135 4156 135131e-135133d 4152->4156 4157 13511fb-1351319 4152->4157 4153->4120 4153->4121 4156->4153 4159 1351343-13513e6 4156->4159 4157->4153 4159->4153 4235->4095 4236->4095 4237->4095 4238->4077 4239->4077 4240->4077 4241->4083 4242->4083 4243->4083 4244->4104 4245->4104 4246->4104 4247->4086 4248->4086 4249->4086 4250->4068 4251->4068 4252->4089 4253->4089 4254->4089 4255->4071 4256->4071 4257->4092 4258->4092 4259->4092 4260->4092 4261->4074 4262->4074
                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 09fd8621797868cd42c1102d2a84a7a1fa23a1410c6904879bd647afd9e00dea
                                          • Instruction ID: d5b9cea0c6d7576efc0aa9719d72279aaf07e079ca417e7d593a1bbd6a20b462
                                          • Opcode Fuzzy Hash: 09fd8621797868cd42c1102d2a84a7a1fa23a1410c6904879bd647afd9e00dea
                                          • Instruction Fuzzy Hash: 14A11974A01269CFCBA8EB24C95875DBBB6BF84605F1081EAD40AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 02375b7cf4b615e8d8b5611b684c0ba8a7672bcb063391f58a705482d0973f09
                                          • Instruction ID: 0134339ee3c789803d68dd512a707064472567248baf7112ef7ef625f9186761
                                          • Opcode Fuzzy Hash: 02375b7cf4b615e8d8b5611b684c0ba8a7672bcb063391f58a705482d0973f09
                                          • Instruction Fuzzy Hash: 9CA12A74A01269CFCBA8EF24C95875DBBB6BF84605F1081EAD40AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: e9dc47be0ece2e1306b2cc16ffd604120a173c2913f04b6914ebcbd206f9498a
                                          • Instruction ID: 88a0c82b98937cadbb51d893b6eddbab167805100dcf0cda8199751a85808e33
                                          • Opcode Fuzzy Hash: e9dc47be0ece2e1306b2cc16ffd604120a173c2913f04b6914ebcbd206f9498a
                                          • Instruction Fuzzy Hash: 05A12B74A00269CFCB68EF24C85875DBBB6BF88605F1081EAD40AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 78f5612276a114b0dbd0a5e03ca1f1e0d4ae224cc00637f1e93d2a097f110583
                                          • Instruction ID: c9e75dfd0dfc7a9389e6ad5213d150dd825e9f94e4756a231ffb90d004f70cea
                                          • Opcode Fuzzy Hash: 78f5612276a114b0dbd0a5e03ca1f1e0d4ae224cc00637f1e93d2a097f110583
                                          • Instruction Fuzzy Hash: CF913B74A01269CFCB68EF24C85875DBBB6BF85605F1081EAD40AA3350DF399E81CF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 17ac25668c53974cffb01427f7c13f1f819a2018e1dd19ffafc80fb95f864294
                                          • Instruction ID: 11239c009c050dfb1e7ef21632c949f4cb9b7e6c0277828eed76c2edb8512c2e
                                          • Opcode Fuzzy Hash: 17ac25668c53974cffb01427f7c13f1f819a2018e1dd19ffafc80fb95f864294
                                          • Instruction Fuzzy Hash: 83911A74A00269CFCB68EF24C95876DBBB6BF85605F1081EAD40AA3350DF399E81CF55
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: bb57768b42d450d6298f520d41eb426b6c7bbabfa4ab8f9b37c26d82396ea2fb
                                          • Instruction ID: d7baca3dc60e14d49a2df90017238eff69c84b1537983dada46cb7173c6c0903
                                          • Opcode Fuzzy Hash: bb57768b42d450d6298f520d41eb426b6c7bbabfa4ab8f9b37c26d82396ea2fb
                                          • Instruction Fuzzy Hash: 9E813B74A00269CFCB68EF24C95876DBBB6BF84605F1081EAD40AA3350DF399E81CF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 331709ccb88a708332afbcde94096673a941002e7763a5c9d035cab699db08ea
                                          • Instruction ID: 3b529f3f114e3dfedd28b0b8f9cc4efd7bb2f84b6cc75cf62a563d711a58e8bd
                                          • Opcode Fuzzy Hash: 331709ccb88a708332afbcde94096673a941002e7763a5c9d035cab699db08ea
                                          • Instruction Fuzzy Hash: BA811C74A00269CFCB69EF24C85876DBBB6BF85605F1081EAD40AA3350DF399E81CF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 546313f428e23b565520c251b72ab6ff755f7fbc0d80e7ae490dfa3206915929
                                          • Instruction ID: cd0fbb98ee9fe49343ab8cbd262e55704c183a820e6fd110d9474c5137deeb2b
                                          • Opcode Fuzzy Hash: 546313f428e23b565520c251b72ab6ff755f7fbc0d80e7ae490dfa3206915929
                                          • Instruction Fuzzy Hash: 22712C74A00269CFCB65EB24C85876DBBBABF84605F1081E9D40AA3350DF399E81CF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 8b3fdbd083fd8d695e84711dce1b5da150fb367a7d635ee1970d13317be4cfbd
                                          • Instruction ID: a3affdb4ece1a1acbc10e8f1eba2f3ab53193dce1555d9675f26b5ef1ff6c7e7
                                          • Opcode Fuzzy Hash: 8b3fdbd083fd8d695e84711dce1b5da150fb367a7d635ee1970d13317be4cfbd
                                          • Instruction Fuzzy Hash: B3712B74A002698FCF69EB34C85876DBBBABF84605F1081E9D40AA3350DF399E81CF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: df65e674879a5f3d6094902fba747103d75c8c5cc0662edf6d70fb557e618a25
                                          • Instruction ID: f0b3bf9633c02be99eff5d753ede4bdb93bc7fddacc60e3ef7f23307480f1506
                                          • Opcode Fuzzy Hash: df65e674879a5f3d6094902fba747103d75c8c5cc0662edf6d70fb557e618a25
                                          • Instruction Fuzzy Hash: 05613D74A002698FCF65EF34C958B6DBBBAAF84605F1081E9D40AA3350DF399E81CF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • KiUserExceptionDispatcher.NTDLL ref: 01351060
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.802660634.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1350000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DispatcherExceptionUser
                                          • String ID:
                                          • API String ID: 6842923-0
                                          • Opcode ID: 96a541e36e351a86c4861290736213d03440ac2a0a479848be79843f25b57824
                                          • Instruction ID: 81e9274e926bf9863e9d1972d417edc14b80fb36f9e858516c428690cc61015e
                                          • Opcode Fuzzy Hash: 96a541e36e351a86c4861290736213d03440ac2a0a479848be79843f25b57824
                                          • Instruction Fuzzy Hash: A6612D74A002699FCF65EB34C85876DBBBABF84605F1081E9D40AA3354DF399E81CF51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.800498280.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_d90000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: f005e75ea6ffce1200bc337858a0a20ea02fa410d050a77ad48c253f1c64a56c
                                          • Instruction ID: 83e09e224182844f904a6e5885e85da81e1bb875ac72706e5fab6104d344dad8
                                          • Opcode Fuzzy Hash: f005e75ea6ffce1200bc337858a0a20ea02fa410d050a77ad48c253f1c64a56c
                                          • Instruction Fuzzy Hash: 2B418971B102099FCF14EFB4D888AAEB7B6BF98304F148969E4129B255DF34D905CBA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 014951E2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: d4b545fb3505ca0fc7b5096822478ec5bd7bc50441ce2eee3405c572712ade02
                                          • Instruction ID: c24f73a296de1239c89a60f57af0763c089d578e007e4cfbc339a678848ccc93
                                          • Opcode Fuzzy Hash: d4b545fb3505ca0fc7b5096822478ec5bd7bc50441ce2eee3405c572712ade02
                                          • Instruction Fuzzy Hash: 6851B2B1D102499FDF15CFA9D884ADEBFB5BF48310F24862AE419AB210D7749945CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 014951E2
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: bb2e7d263455786874f4eed0551ac326a29856e1e14687b0749c9767309429ee
                                          • Instruction ID: 0dc91b26b1009bcd38b494e6db7d1617ee66b5f781e7c26718e80138beb373bc
                                          • Opcode Fuzzy Hash: bb2e7d263455786874f4eed0551ac326a29856e1e14687b0749c9767309429ee
                                          • Instruction Fuzzy Hash: AD41AEB1D103499FDF15CF9AD884ADEBFB5BF48310F24862AE819AB210D7749985CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 01497F41
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: CallProcWindow
                                          • String ID:
                                          • API String ID: 2714655100-0
                                          • Opcode ID: 961f64fd908bf24a24750159d6006ec6c190130e923d02704aa8390c104515e2
                                          • Instruction ID: 32886bde57fbdd2b13a3e04fcf34e930522b9c6c5a1e180e45d3984626f51094
                                          • Opcode Fuzzy Hash: 961f64fd908bf24a24750159d6006ec6c190130e923d02704aa8390c104515e2
                                          • Instruction Fuzzy Hash: 404129B5A102098FDB14CF99C488AABBBF5FF88324F248559E519A7321D734A841CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 0149C262
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID:
                                          • API String ID: 2118026453-0
                                          • Opcode ID: e208296b7e9327fa1adfd6c64b9409607f9a9bc07f1cf1eb6eab717d33d2ad38
                                          • Instruction ID: 31ec85639ce64b80e96d1404e68a7e47fb97388e610f3143b732a2c84c682ba2
                                          • Opcode Fuzzy Hash: e208296b7e9327fa1adfd6c64b9409607f9a9bc07f1cf1eb6eab717d33d2ad38
                                          • Instruction Fuzzy Hash: 5931CBB18053898FCB11DFA9D54839EBFF0EB45318F14849AE449A7252C7799405CFA2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01496C2F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 447d67d538d8e35cab134164a23ed628302fa2d90608350a8a196859e7a1b582
                                          • Instruction ID: 229399be38a5218b32e61268bcca020c03be8fef4d3b4d1b979efe6b4562c0fb
                                          • Opcode Fuzzy Hash: 447d67d538d8e35cab134164a23ed628302fa2d90608350a8a196859e7a1b582
                                          • Instruction Fuzzy Hash: CF2103B5D002489FDB10CFAAD584AEEBFF4EB48324F14801AE854A3310D378A945CF60
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01496C2F
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: ab977e0ce5a9c69612c6e97bf1a41ec055ab89ec813b40e169fa468b6613626e
                                          • Instruction ID: c1ba62187bb7f137979326a36c0e1e2bba3cded8b23f37520aea713c8875739d
                                          • Opcode Fuzzy Hash: ab977e0ce5a9c69612c6e97bf1a41ec055ab89ec813b40e169fa468b6613626e
                                          • Instruction Fuzzy Hash: 2A21E4B5D002489FDB10CF9AD984ADEBFF8EB48320F14841AE914A3310D378A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00D9E6F3
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.800498280.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_d90000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: HookWindows
                                          • String ID:
                                          • API String ID: 2559412058-0
                                          • Opcode ID: ba98669bd92ef76969a5bb67c303edd430f4a84a181e3a90968f12342352f29c
                                          • Instruction ID: 5b9938cb235b097f4644108b83f623ae175b40417754322917c50eb9e5768590
                                          • Opcode Fuzzy Hash: ba98669bd92ef76969a5bb67c303edd430f4a84a181e3a90968f12342352f29c
                                          • Instruction Fuzzy Hash: 932135B5D002098FCB14CF9AD884BEEFBF5EB88320F14841AE459A3250CB74A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00D9E6F3
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.800498280.0000000000D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_d90000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: HookWindows
                                          • String ID:
                                          • API String ID: 2559412058-0
                                          • Opcode ID: 3ba664c9ff30e41a7fcd4b76c14575ad1c970c9fca3224939e760e4828d10413
                                          • Instruction ID: 825966c66a3fb27f385be332ba9d88bbe29baf87f46346be239075c3dd08978d
                                          • Opcode Fuzzy Hash: 3ba664c9ff30e41a7fcd4b76c14575ad1c970c9fca3224939e760e4828d10413
                                          • Instruction Fuzzy Hash: 2F2127B5D002199FCB14DF9AD844BEEFBF5FB88320F14841AE419A7250CB74A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,00000000,?,00D775C9,00000800), ref: 00D7765A
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.800303330.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_d70000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: e9ed5a27bfd489ffb162beb89b5c7b9e0d12cd0d8aaf34b951d6847914004b66
                                          • Instruction ID: 97719702cfc38a819de3344deb79947183f9c2f637e62ccf72d2a55027186c9e
                                          • Opcode Fuzzy Hash: e9ed5a27bfd489ffb162beb89b5c7b9e0d12cd0d8aaf34b951d6847914004b66
                                          • Instruction Fuzzy Hash: 6E1117B6D042098FDB10CFAAD884ADEFBF4EB98324F14852ED459B7600C378A545CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,00000000,?,00D775C9,00000800), ref: 00D7765A
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.800303330.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_d70000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 592ca696d76e607da3830c7ddba199dc1f7847f14c719bec3057a4e959da79eb
                                          • Instruction ID: 861906d0ffdd5b2a55eae766c0e45ef50beedfa9071c5ee6ed1956c9556bdc9a
                                          • Opcode Fuzzy Hash: 592ca696d76e607da3830c7ddba199dc1f7847f14c719bec3057a4e959da79eb
                                          • Instruction Fuzzy Hash: DA1112B69047098FCB10CF9AC844ADEFBF8EB58320F14852AE419B7700D378A945CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 0149C262
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID:
                                          • API String ID: 2118026453-0
                                          • Opcode ID: 8fa22bc060769b5d8af56c30a6e40f83c99e385fb19aeb8e56afb92e37427a1b
                                          • Instruction ID: e8077488f9ddf2b2ea63a1ac4886054fc05f7d50e1f205e2d65a7fdc112dd5eb
                                          • Opcode Fuzzy Hash: 8fa22bc060769b5d8af56c30a6e40f83c99e385fb19aeb8e56afb92e37427a1b
                                          • Instruction Fuzzy Hash: FE1147B1D002098FDB50DFAAC54879EBFF4EB48724F2084AAE409B3640D738A544CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 01494156
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 37373d1f8d4ffd85e3955004679a555341f28ca1e1a4a4d830b198ec56e47f34
                                          • Instruction ID: 8e28a57aef4d26e64fef981c0af94706605d42acbfc150017661f841b011a16a
                                          • Opcode Fuzzy Hash: 37373d1f8d4ffd85e3955004679a555341f28ca1e1a4a4d830b198ec56e47f34
                                          • Instruction Fuzzy Hash: 161123B1D002498BDB10CF9AC548BDEFBF4EB48224F14852AD429B7710D374A546CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 01494156
                                          Memory Dump Source
                                          • Source File: 00000005.00000002.803039119.0000000001490000.00000040.00000800.00020000.00000000.sdmp, Offset: 01490000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_5_2_1490000_shipmentReceipt(22kb).jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 65f4eabf5e3fad3c546ada28a97c6b253b2a005161ab861747a14d538c275dc7
                                          • Instruction ID: 1993d9385097a4496f0f4b905ac958f7b2ce54034c383db3774433796f96e554
                                          • Opcode Fuzzy Hash: 65f4eabf5e3fad3c546ada28a97c6b253b2a005161ab861747a14d538c275dc7
                                          • Instruction Fuzzy Hash: 4F1120B1D002098BDB10DF9AC948ACEFBF4EF88324F14855AD429B7610D378A546CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Execution Graph

                                          Execution Coverage:14.6%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:238
                                          Total number of Limit Nodes:2
                                          execution_graph 40219 2a370a0 40220 2a370b4 40219->40220 40221 2a370bd 40220->40221 40223 2a372da 40220->40223 40230 2a373b0 40223->40230 40235 2a374bc 40223->40235 40240 2a37538 40223->40240 40245 2a374d6 40223->40245 40250 2a373c0 40223->40250 40231 2a37404 40230->40231 40232 2a374fb 40231->40232 40255 2a37bb8 40231->40255 40260 2a37bc8 40231->40260 40236 2a3746f 40235->40236 40237 2a374fb 40236->40237 40238 2a37bb8 2 API calls 40236->40238 40239 2a37bc8 2 API calls 40236->40239 40238->40237 40239->40237 40241 2a3753e 40240->40241 40273 2a37e80 40241->40273 40278 2a37e6f 40241->40278 40242 2a372e3 40242->40221 40246 2a374e9 40245->40246 40247 2a374fb 40245->40247 40248 2a37bb8 2 API calls 40246->40248 40249 2a37bc8 2 API calls 40246->40249 40248->40247 40249->40247 40251 2a37404 40250->40251 40252 2a374fb 40251->40252 40253 2a37bb8 2 API calls 40251->40253 40254 2a37bc8 2 API calls 40251->40254 40253->40252 40254->40252 40256 2a37bd6 40255->40256 40265 2a37c08 40256->40265 40269 2a37c18 40256->40269 40257 2a37be6 40257->40232 40261 2a37bd6 40260->40261 40263 2a37c08 RtlEncodePointer 40261->40263 40264 2a37c18 RtlEncodePointer 40261->40264 40262 2a37be6 40262->40232 40263->40262 40264->40262 40266 2a37c52 40265->40266 40267 2a37c7c RtlEncodePointer 40266->40267 40268 2a37ca5 40266->40268 40267->40268 40268->40257 40270 2a37c52 40269->40270 40271 2a37c7c RtlEncodePointer 40270->40271 40272 2a37ca5 40270->40272 40271->40272 40272->40257 40274 2a37e8e 40273->40274 40283 2a37eb9 40274->40283 40287 2a37ec8 40274->40287 40275 2a37e9e 40275->40242 40279 2a37e8e 40278->40279 40281 2a37eb9 RtlEncodePointer 40279->40281 40282 2a37ec8 RtlEncodePointer 40279->40282 40280 2a37e9e 40280->40242 40281->40280 40282->40280 40284 2a37f01 40283->40284 40285 2a37f27 RtlEncodePointer 40284->40285 40286 2a37f50 40284->40286 40285->40286 40286->40275 40288 2a37f01 40287->40288 40289 2a37f27 RtlEncodePointer 40288->40289 40290 2a37f50 40288->40290 40289->40290 40290->40275 40380 2a3e430 40382 2a3e528 2 API calls 40380->40382 40381 2a3e43f 40382->40381 40469 5b50040 40470 5b50044 40469->40470 40489 5b5d1e2 2 API calls 40470->40489 40490 5b5d2c8 2 API calls 40470->40490 40471 5b500b8 40491 5b5d1e2 2 API calls 40471->40491 40492 5b5d2c8 2 API calls 40471->40492 40472 5b500e7 40493 5b5e240 40472->40493 40474 5b5030d 40487 5b5d1e2 2 API calls 40474->40487 40488 5b5d2c8 2 API calls 40474->40488 40475 5b50fe1 40476 5b51d92 40475->40476 40477 5b51dd9 40476->40477 40497 5c73b38 40477->40497 40501 5c73b48 40477->40501 40478 5b59d23 40485 5c73ef3 SetTimer 40478->40485 40486 5c73f00 SetTimer 40478->40486 40479 5b59d3c 40481 5b5d1e2 2 API calls 40481->40474 40482 5b5d2c8 2 API calls 40482->40474 40485->40479 40486->40479 40487->40475 40488->40475 40489->40471 40490->40471 40491->40472 40492->40472 40505 5b5e2c0 40493->40505 40508 5b5e2b0 40493->40508 40494 5b502a9 40494->40481 40494->40482 40499 5c73b76 40497->40499 40498 5c73c01 40498->40498 40499->40498 40512 5c72eac 40499->40512 40503 5c73b76 40501->40503 40502 5c73c01 40502->40502 40503->40502 40504 5c72eac SetTimer 40503->40504 40504->40502 40506 5b5e2e2 40505->40506 40507 2a3b938 2 API calls 40505->40507 40506->40494 40507->40506 40509 5b5e2c0 40508->40509 40510 5b5e2e2 40509->40510 40511 2a3b938 2 API calls 40509->40511 40510->40494 40511->40510 40514 5c72eb7 40512->40514 40513 5c73d28 40513->40498 40514->40513 40516 5c72edc 40514->40516 40517 5c73e60 SetTimer 40516->40517 40518 5c73ecc 40517->40518 40518->40513 40422 5c7fd21 40424 5c7fd2a 40422->40424 40423 5c7fd6c 40424->40423 40427 5c7fd80 40424->40427 40432 5c7fd70 40424->40432 40437 5c7fec0 40427->40437 40445 5c7fe68 40427->40445 40448 5c7fe59 40427->40448 40428 5c7fdbe 40428->40423 40433 5c7fdbe 40432->40433 40434 5c7fec0 2 API calls 40432->40434 40435 5c7fe59 2 API calls 40432->40435 40436 5c7fe68 2 API calls 40432->40436 40433->40423 40434->40433 40435->40433 40436->40433 40438 5c7fe74 40437->40438 40439 5c7fece 40437->40439 40451 5c7cdec 40438->40451 40441 5c7ff09 40439->40441 40443 5b5dab8 2 API calls 40439->40443 40444 5b5daa8 2 API calls 40439->40444 40441->40428 40442 5c7fe84 40442->40428 40443->40441 40444->40441 40446 5c7cdec 2 API calls 40445->40446 40447 5c7fe84 40445->40447 40446->40447 40447->40428 40449 5c7cdec 2 API calls 40448->40449 40450 5c7fe84 40448->40450 40449->40450 40450->40428 40452 5c7cdf7 40451->40452 40453 5c7ff09 40452->40453 40454 5b5dab8 2 API calls 40452->40454 40455 5b5daa8 2 API calls 40452->40455 40453->40442 40454->40453 40455->40453 40383 2a33df8 40384 2a33e0a 40383->40384 40385 2a33e16 40384->40385 40389 2a34310 40384->40389 40394 2a339c0 40385->40394 40387 2a33e35 40390 2a34335 40389->40390 40398 2a34401 40390->40398 40402 2a34410 40390->40402 40395 2a339cb 40394->40395 40410 2a379e8 40395->40410 40397 2a38a9a 40397->40387 40400 2a34404 40398->40400 40399 2a34514 40399->40399 40400->40399 40406 2a34004 40400->40406 40404 2a34414 40402->40404 40403 2a34514 40403->40403 40404->40403 40405 2a34004 CreateActCtxA 40404->40405 40405->40403 40407 2a354a0 CreateActCtxA 40406->40407 40409 2a35563 40407->40409 40409->40409 40411 2a379f3 40410->40411 40414 2a3a3e0 40411->40414 40413 2a3bd5d 40413->40397 40415 2a3a3eb 40414->40415 40418 2a3b908 40415->40418 40417 2a3be3a 40417->40413 40419 2a3b913 40418->40419 40420 2a3b938 2 API calls 40419->40420 40421 2a3bf2a 40420->40421 40421->40417 40456 5b48958 40460 5b5dab8 2 API calls 40456->40460 40461 5b5daa8 2 API calls 40456->40461 40462 5b5e1e0 40456->40462 40465 5b5e1d0 40456->40465 40457 5b489a2 40460->40457 40461->40457 40464 2a3e528 2 API calls 40462->40464 40463 5b5e1ed 40463->40457 40464->40463 40466 5b5e1e0 40465->40466 40468 2a3e528 2 API calls 40466->40468 40467 5b5e1ed 40467->40457 40468->40467 40291 5b4e5bb 40292 5b4e5c0 FindCloseChangeNotification 40291->40292 40293 5b4e627 40292->40293 40294 5c78e48 40295 5c78e56 40294->40295 40296 5c78e67 40295->40296 40297 5c78ede 40295->40297 40300 5c755ac 2 API calls 40296->40300 40310 5c755ac 40297->40310 40301 5c78e7d 40300->40301 40304 5c755cc 2 API calls 40301->40304 40305 5c78e9e 40304->40305 40306 5c755ac 2 API calls 40305->40306 40307 5c78eb7 40306->40307 40308 5c755cc 2 API calls 40307->40308 40309 5c78ecc 40308->40309 40312 5c755b7 40310->40312 40311 5c78ee5 40314 5c755cc 40311->40314 40312->40311 40318 5c756a8 40312->40318 40315 5c755d7 40314->40315 40316 5c756a8 2 API calls 40315->40316 40317 5c78ef7 40315->40317 40316->40317 40319 5c756b3 40318->40319 40325 5c79090 40319->40325 40330 5c79038 40319->40330 40334 5c79028 40319->40334 40338 5c756ec 40319->40338 40320 5c79011 40320->40311 40326 5c790a0 40325->40326 40343 5b5d1e2 40326->40343 40347 5b5d2c8 40326->40347 40327 5c790a5 40327->40320 40331 5c79049 40330->40331 40332 5c756ec 2 API calls 40331->40332 40333 5c79052 40332->40333 40333->40320 40335 5c79049 40334->40335 40336 5c756ec 2 API calls 40335->40336 40337 5c79052 40336->40337 40337->40320 40339 5c756f7 40338->40339 40341 5b5d1e2 2 API calls 40339->40341 40342 5b5d2c8 2 API calls 40339->40342 40340 5c790a5 40340->40320 40341->40340 40342->40340 40344 5b5d2b0 40343->40344 40345 5b5d2db 40343->40345 40350 2a3b938 40344->40350 40345->40327 40349 2a3b938 2 API calls 40347->40349 40348 5b5d2db 40348->40327 40349->40348 40351 2a3b943 40350->40351 40352 2a3c63e 40351->40352 40355 5b5dab8 40351->40355 40358 5b5daa8 40351->40358 40352->40345 40362 2a3e528 40355->40362 40356 5b5dac6 40356->40352 40359 5b5dab8 40358->40359 40361 2a3e528 2 API calls 40359->40361 40360 5b5dac6 40360->40352 40361->40360 40367 2a3c394 40362->40367 40365 2a3e54b 40365->40356 40368 2a3e708 GetModuleHandleW 40367->40368 40370 2a3e53b 40368->40370 40370->40365 40371 2a3e7b0 40370->40371 40372 2a3c394 GetModuleHandleW 40371->40372 40373 2a3e7c4 40372->40373 40374 2a3e7e9 40373->40374 40376 2a3d8a8 40373->40376 40374->40365 40377 2a3e970 LoadLibraryExW 40376->40377 40379 2a3e9e9 40377->40379 40379->40374
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 06ac7162fe49f05d02defac8bfd246da2f8dd02cc4ef0d184bbff66e584fe2bf
                                          • Instruction ID: 052f353854e072224865317e9bccd7633226b31a3342497f1c66f42d376bc77b
                                          • Opcode Fuzzy Hash: 06ac7162fe49f05d02defac8bfd246da2f8dd02cc4ef0d184bbff66e584fe2bf
                                          • Instruction Fuzzy Hash: 4754C334A01219DFDB24EB64C894AE9B7B2FF89304F1545E9E509AB361DB31AEC1CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f955ca6383a543d6f15d07f463ebbe64bcd16c777ed69a2a201894dfa38d1c99
                                          • Instruction ID: 1785ee6683ee4431430517c644ede16a8a6dec46bad2cef262d95a962bece091
                                          • Opcode Fuzzy Hash: f955ca6383a543d6f15d07f463ebbe64bcd16c777ed69a2a201894dfa38d1c99
                                          • Instruction Fuzzy Hash: EA54C334A01219DFDB24EB64C894AE9B7B2FF89304F1545E9E509AB361DB31AEC1CF50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3839 2a35495-2a35496 3840 2a35498-2a3549a 3839->3840 3841 2a3549c 3839->3841 3840->3841 3842 2a354a0-2a35561 CreateActCtxA 3840->3842 3841->3842 3844 2a35563-2a35569 3842->3844 3845 2a3556a-2a355c4 3842->3845 3844->3845 3852 2a355d3-2a355d7 3845->3852 3853 2a355c6-2a355c9 3845->3853 3854 2a355d9-2a355e5 3852->3854 3855 2a355e8 3852->3855 3853->3852 3854->3855 3857 2a355e9 3855->3857 3857->3857
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 02A35551
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653676213.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_2a30000_kmk.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: c62d312d5bff14efe89241765cd827750e0df537e73ac62da1ab2150ba9d08a8
                                          • Instruction ID: 04e2932758e2500b3bd74c881d8b290bad7966b592e347560adf30e804ac4297
                                          • Opcode Fuzzy Hash: c62d312d5bff14efe89241765cd827750e0df537e73ac62da1ab2150ba9d08a8
                                          • Instruction Fuzzy Hash: FC41E2B1C00618CFDB25DFA9C984BDEBBB6BF58304F60815AE409AB250DBB56945CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3858 2a34004-2a35561 CreateActCtxA 3861 2a35563-2a35569 3858->3861 3862 2a3556a-2a355c4 3858->3862 3861->3862 3869 2a355d3-2a355d7 3862->3869 3870 2a355c6-2a355c9 3862->3870 3871 2a355d9-2a355e5 3869->3871 3872 2a355e8 3869->3872 3870->3869 3871->3872 3874 2a355e9 3872->3874 3874->3874
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 02A35551
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653676213.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_2a30000_kmk.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 71c93fc393228559d3a2c09e09e89c56111dcd27d70cfbb1c5dfc6072d335208
                                          • Instruction ID: fdd842945f47ed4509f73ec6e430811ff583e5766baa262e8a7254797f7fc241
                                          • Opcode Fuzzy Hash: 71c93fc393228559d3a2c09e09e89c56111dcd27d70cfbb1c5dfc6072d335208
                                          • Instruction Fuzzy Hash: 0D41E2B1C00728CBDB24DFA9C984B8EBBF6BF58314F608159E409BB250DBB56945CF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3887 2a37eb9-2a37f08 call 2a37cf0 call 2a37d48 3892 2a37f0a-2a37f0c 3887->3892 3893 2a37f0e 3887->3893 3894 2a37f13-2a37f1b 3892->3894 3893->3894 3895 2a37f77-2a37f89 3894->3895 3896 2a37f1d-2a37f4e RtlEncodePointer 3894->3896 3898 2a37f50-2a37f56 3896->3898 3899 2a37f57-2a37f6d 3896->3899 3898->3899 3899->3895
                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 02A37F3D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653676213.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_2a30000_kmk.jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID:
                                          • API String ID: 2118026453-0
                                          • Opcode ID: 0bd900a8faec3603b4e5d4ea61e1935d7aacf205949ab45f65965a6d20b51af7
                                          • Instruction ID: 95b8c87ec33363d38ed14f2fec27419072df9c91258c55ec2aa5248ff0940c84
                                          • Opcode Fuzzy Hash: 0bd900a8faec3603b4e5d4ea61e1935d7aacf205949ab45f65965a6d20b51af7
                                          • Instruction Fuzzy Hash: 4C218CB19043848FDB61DFA9DA447DAFBF4FB18324F14845AE405E3641D739A905CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3875 2a37c08-2a37c5a 3878 2a37c60 3875->3878 3879 2a37c5c-2a37c5e 3875->3879 3880 2a37c65-2a37c70 3878->3880 3879->3880 3881 2a37c72-2a37ca3 RtlEncodePointer 3880->3881 3882 2a37cd1-2a37cde 3880->3882 3884 2a37ca5-2a37cab 3881->3884 3885 2a37cac-2a37ccc 3881->3885 3884->3885 3885->3882
                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 02A37C92
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653676213.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_2a30000_kmk.jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID:
                                          • API String ID: 2118026453-0
                                          • Opcode ID: 8b513413c6cef29c319c3788ea7044274cd46af01d11927a779746bba8beae5c
                                          • Instruction ID: 119ce516d431c995a7c558bf3e63b497eae64b1df3d94b65744dcedec79c9b56
                                          • Opcode Fuzzy Hash: 8b513413c6cef29c319c3788ea7044274cd46af01d11927a779746bba8beae5c
                                          • Instruction Fuzzy Hash: 97219AB1D013458FEBA0CFA9D98879ABBF4EB19324F14842AE405A3641C7786945CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3901 2a3d8a8-2a3e9b0 3903 2a3e9b2-2a3e9b5 3901->3903 3904 2a3e9b8-2a3e9e7 LoadLibraryExW 3901->3904 3903->3904 3905 2a3e9f0-2a3ea0d 3904->3905 3906 2a3e9e9-2a3e9ef 3904->3906 3906->3905
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02A3E7E9,00000800,00000000,00000000), ref: 02A3E9DA
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653676213.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_2a30000_kmk.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 6bf025c5a1f3c5df888a6e5dc0d1723b0c0f3476213dd5a5cb4d0040b551257a
                                          • Instruction ID: 2c2256049dc3c0b1bb8420b0aff3c778247c140d7b13698cab738e0d08333111
                                          • Opcode Fuzzy Hash: 6bf025c5a1f3c5df888a6e5dc0d1723b0c0f3476213dd5a5cb4d0040b551257a
                                          • Instruction Fuzzy Hash: B011F2B6D002199FDB10CF9AC584ADEFBF8EB58324F10846AE459A7600C774A545CFA4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3909 5b4da00-5b4da13 3911 5b4e5c0-5b4e625 FindCloseChangeNotification 3909->3911 3912 5b4e627-5b4e62d 3911->3912 3913 5b4e62e-5b4e656 3911->3913 3912->3913
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,05B4E471,?,?), ref: 05B4E618
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662920881.0000000005B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b40000_kmk.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: 8681249348355c273b64caf307f64d977264d22ee78d04483376bc24d73bc7a6
                                          • Instruction ID: 2ebeabcdf1fc7c353552dc8e19d892a816a13ef4565435c14cc6725018e99902
                                          • Opcode Fuzzy Hash: 8681249348355c273b64caf307f64d977264d22ee78d04483376bc24d73bc7a6
                                          • Instruction Fuzzy Hash: 761179B28002488FCB10DF99C4847EEBBF8EF68324F10845AD499A7240D738A645CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3916 2a37c18-2a37c5a 3919 2a37c60 3916->3919 3920 2a37c5c-2a37c5e 3916->3920 3921 2a37c65-2a37c70 3919->3921 3920->3921 3922 2a37c72-2a37ca3 RtlEncodePointer 3921->3922 3923 2a37cd1-2a37cde 3921->3923 3925 2a37ca5-2a37cab 3922->3925 3926 2a37cac-2a37ccc 3922->3926 3925->3926 3926->3923
                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 02A37C92
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653676213.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_2a30000_kmk.jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID:
                                          • API String ID: 2118026453-0
                                          • Opcode ID: a547740bea5db3ca193f179427bb3cd52e05284b5e735f24fcb547816834035a
                                          • Instruction ID: 18697d1bdcf38591daaf960b80387f098fc4daa757119e49acd9d7941a945d1f
                                          • Opcode Fuzzy Hash: a547740bea5db3ca193f179427bb3cd52e05284b5e735f24fcb547816834035a
                                          • Instruction Fuzzy Hash: 7A114FB09013098FDB60DFAAD98879EBBF4FB49325F108429E405A3740DB796944CF95
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3928 2a37ec8-2a37ef9 3929 2a37f01-2a37f08 call 2a37d48 3928->3929 3930 2a37efc call 2a37cf0 3928->3930 3933 2a37f0a-2a37f0c 3929->3933 3934 2a37f0e 3929->3934 3930->3929 3935 2a37f13-2a37f1b 3933->3935 3934->3935 3936 2a37f77-2a37f89 3935->3936 3937 2a37f1d-2a37f4e RtlEncodePointer 3935->3937 3939 2a37f50-2a37f56 3937->3939 3940 2a37f57-2a37f6d 3937->3940 3939->3940 3940->3936
                                          APIs
                                          • RtlEncodePointer.NTDLL(00000000), ref: 02A37F3D
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653676213.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_2a30000_kmk.jbxd
                                          Similarity
                                          • API ID: EncodePointer
                                          • String ID:
                                          • API String ID: 2118026453-0
                                          • Opcode ID: f7c39898debc74b05af6e64e8794cc905622a94bfab17411164e882cab2826f6
                                          • Instruction ID: 571312d8409894b01db12b024229395f03984c115b0ae5cfde5ceb53eade125d
                                          • Opcode Fuzzy Hash: f7c39898debc74b05af6e64e8794cc905622a94bfab17411164e882cab2826f6
                                          • Instruction Fuzzy Hash: 4E1151B19003498FDB21DF99DA4479AFBF8FB08325F10841AE405E3740CB7AA944CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3942 2a3c394-2a3e748 3944 2a3e750-2a3e77b GetModuleHandleW 3942->3944 3945 2a3e74a-2a3e74d 3942->3945 3946 2a3e784-2a3e798 3944->3946 3947 2a3e77d-2a3e783 3944->3947 3945->3944 3947->3946
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,02A3E53B), ref: 02A3E76E
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653676213.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_2a30000_kmk.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 24dd42e60137c02e2cc16280361d2bc847975cac93e4db046cbe1bfe6942ab75
                                          • Instruction ID: eaa124ee3959b53d8f533b736c838edd06b813cfe1361306f1923124697b20ae
                                          • Opcode Fuzzy Hash: 24dd42e60137c02e2cc16280361d2bc847975cac93e4db046cbe1bfe6942ab75
                                          • Instruction Fuzzy Hash: 861120B5D00648CBDB10CF9AC584BDEFBF4EF48228F10851AE929B7600D7B8A545CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3949 5b4d814-5b4d81b 3950 5b4e5c0-5b4e625 FindCloseChangeNotification 3949->3950 3951 5b4e627-5b4e62d 3950->3951 3952 5b4e62e-5b4e656 3950->3952 3951->3952
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,05B4E471,?,?), ref: 05B4E618
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662920881.0000000005B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b40000_kmk.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: a3d106c91c55353ecd51e0d21018dbf66498cfe92d7b4c816207303beef02827
                                          • Instruction ID: 24ac7133a9ee406c481c15b90fcb20b81a4dd659f6b87ab7ad9ffcdfe07f050a
                                          • Opcode Fuzzy Hash: a3d106c91c55353ecd51e0d21018dbf66498cfe92d7b4c816207303beef02827
                                          • Instruction Fuzzy Hash: B1113AB58006098FCB20DF99C5847DEBBF8FB58320F108459E555A7740D778A544CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3955 5b4e5bb-5b4e625 FindCloseChangeNotification 3957 5b4e627-5b4e62d 3955->3957 3958 5b4e62e-5b4e656 3955->3958 3957->3958
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,05B4E471,?,?), ref: 05B4E618
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662920881.0000000005B40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b40000_kmk.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: 53a048c7346b49ef7f7ce556893f263fef1ef6ae229367c4eedea3dbde1d8263
                                          • Instruction ID: 4ead6f933b91a73ec35a40272734371df8a390e0b567e617e5498c7fc8311e06
                                          • Opcode Fuzzy Hash: 53a048c7346b49ef7f7ce556893f263fef1ef6ae229367c4eedea3dbde1d8263
                                          • Instruction Fuzzy Hash: 001136B68006098FCB10DF9AC584BDEBBF8FF58320F14846AE559A7740D778A544CFA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3961 5c72edc-5c73eca SetTimer 3963 5c73ed3-5c73ee7 3961->3963 3964 5c73ecc-5c73ed2 3961->3964 3964->3963
                                          APIs
                                          • SetTimer.USER32(?,04DF6190,?,?,?,?,?,?,?,05C73D28,00000000,?,00000000), ref: 05C73EBD
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.663217646.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5c70000_kmk.jbxd
                                          Similarity
                                          • API ID: Timer
                                          • String ID:
                                          • API String ID: 2870079774-0
                                          • Opcode ID: 002d43678d009a0295202b8e408bb96a5a108332c49c9b83b1dd613c232eb9df
                                          • Instruction ID: cc21579734235833cfe54ad2908b77c2416a07cd1e41161a198633bbea7100ff
                                          • Opcode Fuzzy Hash: 002d43678d009a0295202b8e408bb96a5a108332c49c9b83b1dd613c232eb9df
                                          • Instruction Fuzzy Hash: 581110B59002589FDB10DF8AC884BDEBBF8EB48324F10881AE959A3600C374A944CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 3966 5c73e58-5c73eca SetTimer 3967 5c73ed3-5c73ee7 3966->3967 3968 5c73ecc-5c73ed2 3966->3968 3968->3967
                                          APIs
                                          • SetTimer.USER32(?,04DF6190,?,?,?,?,?,?,?,05C73D28,00000000,?,00000000), ref: 05C73EBD
                                          Memory Dump Source
                                          • Source File: 00000006.00000002.663217646.0000000005C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C70000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5c70000_kmk.jbxd
                                          Similarity
                                          • API ID: Timer
                                          • String ID:
                                          • API String ID: 2870079774-0
                                          • Opcode ID: 243ab60e2dafa4bcd2f36f923d50784e8e5dd2c1658d3080cb672fee6891379c
                                          • Instruction ID: 961f84d86231c8b488b4b9706b3d74f2801b004623e40996af8369083cd3dd0b
                                          • Opcode Fuzzy Hash: 243ab60e2dafa4bcd2f36f923d50784e8e5dd2c1658d3080cb672fee6891379c
                                          • Instruction Fuzzy Hash: D011F2B58006489FDB10DF9AD884BDEBFF8FB58324F10885AE559A7640C379A544CFA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 348048967466cf4d066cb248976c35ae664affdb3cc11aeeb0b4cd2a6d99dd95
                                          • Instruction ID: a8f83df775e863545d484f4d4ff04f1c0a99928ae9e561cc072448937535bf6a
                                          • Opcode Fuzzy Hash: 348048967466cf4d066cb248976c35ae664affdb3cc11aeeb0b4cd2a6d99dd95
                                          • Instruction Fuzzy Hash: A851C412A9E3C00FF30B637549226A57F7ADB53669B0A41EFD0D2CE9A3C55D580B8372
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c24a7206510fecfa36188a656ff99cde993eb6cb24a1dcd15acf78d1bb9b57a2
                                          • Instruction ID: 7a363d2874b5b81796f482f23c25bbb3cdf981b10b8ef6fbade86eb4d6ef9ad9
                                          • Opcode Fuzzy Hash: c24a7206510fecfa36188a656ff99cde993eb6cb24a1dcd15acf78d1bb9b57a2
                                          • Instruction Fuzzy Hash: FD516B30900A1A9FDB19CF58C980ABAF7F5FF44310B51CA99E966A7280D730FA15CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1e6454234563f0c33190e183c7c65c1bb54e011b495660497a86557800bbed93
                                          • Instruction ID: 1c3acb8caa11d1305f994b1f10649110534d9cc0ab8aed53ab793e5393713b4d
                                          • Opcode Fuzzy Hash: 1e6454234563f0c33190e183c7c65c1bb54e011b495660497a86557800bbed93
                                          • Instruction Fuzzy Hash: 3C514B31900A1A9FDB19CF58C980ABEF7F5FF44320B558A59E966A7284D730FE15CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0fecb025477a4cfb18869d23b05616ee5fb94c95a7ad59f24c42a3211ef2e7ef
                                          • Instruction ID: 9884ad202929b7f4a47a7a67ed5bae85f4aee05f65038424510f21a9c516138d
                                          • Opcode Fuzzy Hash: 0fecb025477a4cfb18869d23b05616ee5fb94c95a7ad59f24c42a3211ef2e7ef
                                          • Instruction Fuzzy Hash: 54417270940215CFEF18FBB4C4547AD7AB6EF88324F1445ADD811BB240DB35A982CBA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 281ff135541cce31ca0c2c24440449a8d430e771daff3b44d5ecf28998d6ff49
                                          • Instruction ID: 20e011d3e74ad58198e814e20579fba1c8073c693977e9b3d81371354f2ae0a8
                                          • Opcode Fuzzy Hash: 281ff135541cce31ca0c2c24440449a8d430e771daff3b44d5ecf28998d6ff49
                                          • Instruction Fuzzy Hash: 8F415870B016198FCB19DBA8D884AAEBBF2FF49310F1045A9E506A7341DB75AD41CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c4573ad914277022c278694aa4706740ea8eaf4ccae85495c3cabe780ba71709
                                          • Instruction ID: 6413a0223270f13590e2c80ec1a8bd32d8f6d4c6e3dd2b29bff1510143cee3ee
                                          • Opcode Fuzzy Hash: c4573ad914277022c278694aa4706740ea8eaf4ccae85495c3cabe780ba71709
                                          • Instruction Fuzzy Hash: 7141B230A006068FCB15DF38D4548AEFBB2FF883147108AADD459AB351DB35F942CB91
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 795bd4497799d6416ac1427e03adcba5446d251bac380f62d1d1a571e14a71dd
                                          • Instruction ID: 67750ec529ceb9ec6c0bc1f7c692d58edf7724ded4746cd51cf90e8b13ae53d4
                                          • Opcode Fuzzy Hash: 795bd4497799d6416ac1427e03adcba5446d251bac380f62d1d1a571e14a71dd
                                          • Instruction Fuzzy Hash: 2F3170317001048FDB19EB7DD844AAD73EAEF89625B1401FED91ACB3A1DB31E902CB50
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d2fbc4c924ff723434ed7fd6d2b96456b3936bb45c6bdc83110532aee141936
                                          • Instruction ID: 46797ff6bf6f9555b45dfd8227ff418c6a5c37877d6eb650a992fefc43c8d24d
                                          • Opcode Fuzzy Hash: 4d2fbc4c924ff723434ed7fd6d2b96456b3936bb45c6bdc83110532aee141936
                                          • Instruction Fuzzy Hash: 5F31F8343047018FE778DF28D585B2AB7E3FB49220B144BAAE897CB660D770FA458B51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b1ff77d28b252499500f8701030bcb25a439087e292afc5f0d15b6a5bb0eb60e
                                          • Instruction ID: 8a96bb428e09ce013449148bdfa931ebf94cdf3734f918a24a9f491d58e3632a
                                          • Opcode Fuzzy Hash: b1ff77d28b252499500f8701030bcb25a439087e292afc5f0d15b6a5bb0eb60e
                                          • Instruction Fuzzy Hash: 7231C1709002558FEF2CFBB4C4547BD7AA6EF89324F1448ACC812AB240DA35A942CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6729124fa951b2afe6d3cd1df7d5deabec9ef7de17bea40036f391dcc7505736
                                          • Instruction ID: ea0172a87e90dc2e3331ad3a1f9f36bde260f80f8ef042720c7d20dcf2c4e539
                                          • Opcode Fuzzy Hash: 6729124fa951b2afe6d3cd1df7d5deabec9ef7de17bea40036f391dcc7505736
                                          • Instruction Fuzzy Hash: B531BC70B016499FCB19DBA9D8947ADFBB2EF4A310F1045A9E902A7340EB71A901CB80
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 79ff08987b1b03d3f413e9c0ec65b1b834c39a0379ae34134f73d88407223a75
                                          • Instruction ID: a4ac21c3cef74ec2b2511a0b310e8006450655948dc1b416e2cc9a2d4ed6a6de
                                          • Opcode Fuzzy Hash: 79ff08987b1b03d3f413e9c0ec65b1b834c39a0379ae34134f73d88407223a75
                                          • Instruction Fuzzy Hash: 3B31E875A00209EFDB09AFE0E8589AEBBB7EF89314F048559F5016B260DB747815DB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a368d9196d1fdf40d7b72998281f357849b5bfff07a30fad5f5cce8fa11a28e
                                          • Instruction ID: ccce3f454a63602eeb349fc9ad4dcbd9474a6250d22c4da9a994842c0c1aa8b5
                                          • Opcode Fuzzy Hash: 5a368d9196d1fdf40d7b72998281f357849b5bfff07a30fad5f5cce8fa11a28e
                                          • Instruction Fuzzy Hash: 09311432C00B0ADECB01EF68C854499F7B1FF95314B118B9AE95967121FB30E6D5CB81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f158cdaff8028dd8987a68350ca6c9001f52db95dcf1cd5d5215e00490bbca5
                                          • Instruction ID: 5d30800c9eea4c0e5b94eae85fd748cbc049395b455c0a66c551a0888d0df593
                                          • Opcode Fuzzy Hash: 6f158cdaff8028dd8987a68350ca6c9001f52db95dcf1cd5d5215e00490bbca5
                                          • Instruction Fuzzy Hash: 6D212A343046418FD764DF39D485B2AB7F6FF4A220B184EA9E496CB621D770F9058B51
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653140828.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_dcd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4ef0468fabb9aa47aff61b2f2470eae553c238f9e037f0767adc892c4e5f7644
                                          • Instruction ID: 9f709b50c0d32e42ccc2f2be626046592c10d896ef9c3eea7f693b3e1225f5cc
                                          • Opcode Fuzzy Hash: 4ef0468fabb9aa47aff61b2f2470eae553c238f9e037f0767adc892c4e5f7644
                                          • Instruction Fuzzy Hash: 90210271504241EFCB059F04C9C0F16BF66FB94324F24C57DE9090B646C33AE806D6B1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653140828.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_dcd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 778ef03297baba8b5cd3b907b8ff22d2607b62e21e8201a07247c14e20b16915
                                          • Instruction ID: da21930d207bf67a1ee82f9f94ad397e0a08e29a46da5d23fbd9c51a96ce32fe
                                          • Opcode Fuzzy Hash: 778ef03297baba8b5cd3b907b8ff22d2607b62e21e8201a07247c14e20b16915
                                          • Instruction Fuzzy Hash: A72103B5504241EFDB01CF14D9C0F26BF66FB99328F24857DE9450B206C33AD846DAB1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2680d3fa6db1b8cef0fbfd82847a551955d132103c2d55c682e13a6b13f7afda
                                          • Instruction ID: 160bdc32996057ad4f761c1bfb7245c0d9a2150b6303a88d00aac14c67a0014e
                                          • Opcode Fuzzy Hash: 2680d3fa6db1b8cef0fbfd82847a551955d132103c2d55c682e13a6b13f7afda
                                          • Instruction Fuzzy Hash: 2C21E775A00219EFDB09AFA0E85899EBBB7FF88304F058519F5027B360DB74A815DF90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1808e87c71c17f29f56e6b06a159fe05a466837d566bd58150ebef2ae14f7f0d
                                          • Instruction ID: ab1c55d87b958c3902a11879a2cdf82c15726acf4bacebb4a67a7147f8155a46
                                          • Opcode Fuzzy Hash: 1808e87c71c17f29f56e6b06a159fe05a466837d566bd58150ebef2ae14f7f0d
                                          • Instruction Fuzzy Hash: 27310332D10B0ADECB01EFA9C854499FBB1FF95310B118B5AE95967121FB30E695CB81
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653206418.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_ddd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 61cd13ae4bb5909b5fd7de86116f576e6856464d1a94fb96b5d4444af5637ac1
                                          • Instruction ID: d2c77da7a21909ae9971679e7fd9e73601d6d73b58fb38092b344c04a2b542e3
                                          • Opcode Fuzzy Hash: 61cd13ae4bb5909b5fd7de86116f576e6856464d1a94fb96b5d4444af5637ac1
                                          • Instruction Fuzzy Hash: 50210775504244EFDF05DF14D9C0B26BB66FB84314F24C66EE9494B346C33AD846CA72
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653206418.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_ddd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2f2424c1551f4f09428f3a17ae1747da8b6b549244b383bf7fab11262b3809e4
                                          • Instruction ID: feb08cb6a79c80dddb514c2d6e63235068537e6a1e1354495894e03debf35eed
                                          • Opcode Fuzzy Hash: 2f2424c1551f4f09428f3a17ae1747da8b6b549244b383bf7fab11262b3809e4
                                          • Instruction Fuzzy Hash: 4D21D075504240EFDF05DF54D9C0B26BFA6FB88314F24CAAAE8494B346C73AD846CA71
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4b76ecce87fb05a9e0b995c559e03f17e9203ce9445450ad3ea2505963516dba
                                          • Instruction ID: 23a81f57f00d02559906a3be73591191418cc784cf30d13554c8aea7d2669015
                                          • Opcode Fuzzy Hash: 4b76ecce87fb05a9e0b995c559e03f17e9203ce9445450ad3ea2505963516dba
                                          • Instruction Fuzzy Hash: A1214C70A0060ACFCB24DF64C5849AEFBB6FF88314B104AADD54A97351EB35B906CB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 168a72968a19594876c53a29d38c8b657c74974023abf40ebc553590958f3de9
                                          • Instruction ID: db72b5a9106cd210792441339947c7f233838310a7d08fc7a18174d72ded51bf
                                          • Opcode Fuzzy Hash: 168a72968a19594876c53a29d38c8b657c74974023abf40ebc553590958f3de9
                                          • Instruction Fuzzy Hash: B411C1343402144FEB05B769D451B2F72EBEBC8B08F00482AE102DB7E5CEB9EC0297A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1704702ca1cf2bce724cc89b6ec6fece1f05416fda4c8d984e7523ad7160e444
                                          • Instruction ID: 70cc7e36ae40bf6a6b5bbf25e878de80cdfb1c81336257dea9261eb84f20ee7d
                                          • Opcode Fuzzy Hash: 1704702ca1cf2bce724cc89b6ec6fece1f05416fda4c8d984e7523ad7160e444
                                          • Instruction Fuzzy Hash: 5C11E3317043005BD3259B68E4A175B77EBFBC8314F144869E286C7381DFB4B8008BA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653140828.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_dcd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                          • Instruction ID: 8b741e5d4449904b5c1395f59a4357fc83ec5e16e2b54cc8e8b781cdba441087
                                          • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                          • Instruction Fuzzy Hash: 0B11B176504281DFCB16CF10D9C4B16BF72FB94324F28C6ADD9444B616C33AD856CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653140828.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_dcd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                          • Instruction ID: a621d1ca9df7ac5024562cc00628eb0a72a092cf0f992e80736416afb797e81c
                                          • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                                          • Instruction Fuzzy Hash: E011D376504280DFCB12CF14DAC4B16BF72FB95324F28C6ADD8490B616C33AD856CBA1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a4070a6966b101626ace69cc59e83593929c7c06415c43cb503f9e77a19e920
                                          • Instruction ID: e94af219a5ff74886b2dd88871f44923aba6c134ada033c371ca8c83160451ec
                                          • Opcode Fuzzy Hash: 0a4070a6966b101626ace69cc59e83593929c7c06415c43cb503f9e77a19e920
                                          • Instruction Fuzzy Hash: 3E11C4317147005BE325AB68E4A5B5B73EBFBC8314F148869E287C7781DF78B8418BA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653206418.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_ddd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                          • Instruction ID: 6d84dc202be7af68a6cf866fea060f7778eb7ffcc9aa7a504568267988ec0789
                                          • Opcode Fuzzy Hash: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                          • Instruction Fuzzy Hash: B9118B75504280DFDB12CF54D5C4B15BFB2FB89324F28C6AAD8494B756C33AD84ACB61
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653206418.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_ddd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                          • Instruction ID: e9a9f8ae2cbd8c1954960e763ddce33d5869f9f90f431e014a1ffc8bf0093886
                                          • Opcode Fuzzy Hash: 9987972c5ad5a0bbdfc3a90a2c4a8b6c80251489d692dd004c95719536adb841
                                          • Instruction Fuzzy Hash: 2D119D79504284DFDB16CF14D5C4B15BBB2FB84324F28C6AAD8494B756C33AD84ACB62
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 27dc2ed2670a6953ad945a2091f55124219ef1f48294041ad2150976551c3d15
                                          • Instruction ID: d71a9b52224b6dfb61a8f852801287d98df67145f81355ba019ebaf315920c0d
                                          • Opcode Fuzzy Hash: 27dc2ed2670a6953ad945a2091f55124219ef1f48294041ad2150976551c3d15
                                          • Instruction Fuzzy Hash: B7118270940105CFEB18FFB5D4547BD7AB2EB48329F1444ADD402A7290CB38AA41CBA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653140828.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_dcd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 50fdfb4fee6a9fb40610e7dce0b09678fcc17ddf8b7f69962376bde0ee232eae
                                          • Instruction ID: 066bd02fa4ce2eaaa9666f8a7f021d42c7b3f49ccf9a5eecd68fe62092781ba7
                                          • Opcode Fuzzy Hash: 50fdfb4fee6a9fb40610e7dce0b09678fcc17ddf8b7f69962376bde0ee232eae
                                          • Instruction Fuzzy Hash: 1B01F271448389AAE7109A29DC84B66FFD8EF50334F28852EFD8D1B242C778D840CAB5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2bc53529c4684a8cdb7bb0e7f1a4c30f2d8d7f977d02f07e4b44993beee8da02
                                          • Instruction ID: 8cf2852ac35003b92a63ed6c57508d1569d4eaca297de4cbf6457cc42d0ded8b
                                          • Opcode Fuzzy Hash: 2bc53529c4684a8cdb7bb0e7f1a4c30f2d8d7f977d02f07e4b44993beee8da02
                                          • Instruction Fuzzy Hash: F4F0FC32A041555FDF14DB95D8406BFFBBAFFC5631F044576E40583200DA745801C3C4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6b46aabac35a13c7e5b04e96117b3c4b22a995800df253684f9372ed8b312bb5
                                          • Instruction ID: 00e210e4389df59ecbe53057e65bd253cf55599384a6389b885141140885e2db
                                          • Opcode Fuzzy Hash: 6b46aabac35a13c7e5b04e96117b3c4b22a995800df253684f9372ed8b312bb5
                                          • Instruction Fuzzy Hash: 9BF0F631700B04DBC7167B29D84886EBBA6FFC9321701415EF80AC7320DF748982C7A1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7cb94c0c867d416692616c0b2ee183865bf251e959bd9985c9032543da81b261
                                          • Instruction ID: 9c59970f4eb48a2c76ab00ad8b4268fdb8f8b8a0ec7f42a2a22e4de9c23fe32d
                                          • Opcode Fuzzy Hash: 7cb94c0c867d416692616c0b2ee183865bf251e959bd9985c9032543da81b261
                                          • Instruction Fuzzy Hash: E0F09632A041159BDB18DB56D841A7FF7ABFBC5621B15857AD40987204DA74AC02C3D4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e98708b1be2b8b068c241cf18165ffd5011b28a7ca83b8b0683d65b2ee7943ef
                                          • Instruction ID: 349c3efa05300f5ed60d1893539840be2ccdcb3ae0d2a1d852769e29b2c08abb
                                          • Opcode Fuzzy Hash: e98708b1be2b8b068c241cf18165ffd5011b28a7ca83b8b0683d65b2ee7943ef
                                          • Instruction Fuzzy Hash: 26F0BE313402146BEA287679A891B6F329ADBC2B54F50042DE2069B3C4CE65AC0282B6
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.653140828.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_dcd000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bfea602c093d5da47215ea95941f065fc3fea050de4b89867ee7329a7c72ec09
                                          • Instruction ID: 07ee490787eb1d61395f77dc8c8c9673499907cc743e7b92d5dc92e95cdfc3f1
                                          • Opcode Fuzzy Hash: bfea602c093d5da47215ea95941f065fc3fea050de4b89867ee7329a7c72ec09
                                          • Instruction Fuzzy Hash: BAF0C271404288AAE7109A06CC84B62FFD8EB90334F18C55AED485F282C3789844CAB1
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 902df2db1fa26f3fad9bc10b76475ff3af182cc25431e368e5a749caa85fa52a
                                          • Instruction ID: 0537ca5ab8e63d09ce0c61a9d630b0c39d88d0680fad556d42dfd6d5b93df9be
                                          • Opcode Fuzzy Hash: 902df2db1fa26f3fad9bc10b76475ff3af182cc25431e368e5a749caa85fa52a
                                          • Instruction Fuzzy Hash: 24F0E231A002599FDB10EB6CD8043DEBBF4FB84319F0485A9D559E3341D374AA0ACBC0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 34b4b102d9526c23684ce26d3425b76b0e897f6d6f8d30c0420ec48ffcfa0fc3
                                          • Instruction ID: 7da277e52f85f827f7cf5c0ac99de3739ad4ef25c2c314ed36d644965bf95422
                                          • Opcode Fuzzy Hash: 34b4b102d9526c23684ce26d3425b76b0e897f6d6f8d30c0420ec48ffcfa0fc3
                                          • Instruction Fuzzy Hash: 13F0B470A002098BDB1CFFB5D4147BD7AB2EF48319F0088ACD402AB290CF38A941DBA5
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 466b966c4bffc2fbee71538c1250cae77cb862ca2ee2d7030ab03d3672e40991
                                          • Instruction ID: c0f4a47194e243afcaabe2e63ee6e3d7a6ad4fc60fc1a0f3358d0ea4e78f9264
                                          • Opcode Fuzzy Hash: 466b966c4bffc2fbee71538c1250cae77cb862ca2ee2d7030ab03d3672e40991
                                          • Instruction Fuzzy Hash: A2F01C716007049B8B1DDF2DD5419957BE5FF4632832489ADE029CF256E773E9038BC4
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f4e497668a2e3f5f731e000d230e289f69bf5820b99f4c7fa01f441b24b9906e
                                          • Instruction ID: 00ec638c8165b9048ae2bdeeb67763758434c2cbae127ec15c27fa8f0364ab9d
                                          • Opcode Fuzzy Hash: f4e497668a2e3f5f731e000d230e289f69bf5820b99f4c7fa01f441b24b9906e
                                          • Instruction Fuzzy Hash: B6F065716442456BCB09DF78E4516B67BE5FB06358B1408ADF095CF216D762F90387C0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 31e4ad9f433c37d984c516b6deed22389b788b9f9f59df0cdc6f46403e671eec
                                          • Instruction ID: 75676fc30ee18171ae46f9eb9347354dcd8c429b8ab26d8b43c87b75c518caa4
                                          • Opcode Fuzzy Hash: 31e4ad9f433c37d984c516b6deed22389b788b9f9f59df0cdc6f46403e671eec
                                          • Instruction Fuzzy Hash: EFE03931A002199FCB10AB6DD8086DEB7F8EB84215F004569D919E3244D774AA1ACB90
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ae6f494a13fef0ffd4518536d68192acef5c9bbde7ff0b73be85617996499d7f
                                          • Instruction ID: 476d599aaf8f317001f2075ed6200c866a639829a55f977851f83b3071be0d79
                                          • Opcode Fuzzy Hash: ae6f494a13fef0ffd4518536d68192acef5c9bbde7ff0b73be85617996499d7f
                                          • Instruction Fuzzy Hash: C6D0A7352013905BC71423B97A043973FACDF4B223F0804B1E244C1701C5BA480283D0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f0a5c3305d5a76f87e4fbfcb5e80f7f2f7674ea653252fd32bad70cefe3b3c33
                                          • Instruction ID: c0f527eb0f64129f0aa1efca1f8defe44edb7ab7ca600af1ac22533472ba800a
                                          • Opcode Fuzzy Hash: f0a5c3305d5a76f87e4fbfcb5e80f7f2f7674ea653252fd32bad70cefe3b3c33
                                          • Instruction Fuzzy Hash: 7BC0122240A390AAEB59AB7864003A6BFE2DB86310F04C4ADC2C986A16C63848039790
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7dc3c144eb6a0c584b34fe576b8d79985957be6f7a5dc285aa720da22e48acf4
                                          • Instruction ID: a0c927cef1e33a7e879eb32e6a601b26f1866f8c5784b7f66d83cda76589b940
                                          • Opcode Fuzzy Hash: 7dc3c144eb6a0c584b34fe576b8d79985957be6f7a5dc285aa720da22e48acf4
                                          • Instruction Fuzzy Hash: E7D0C9795010898ECF41AB60F666774BF22EBA230EF446484E491475AAC7686843DFC2
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a218cfe41a6cb7ab304e42fff14fde6f2b97d82409eca73fb501d3ce0487613f
                                          • Instruction ID: 19b3e1c0b612bb4d6f6eecf81facbe67453a3b432dc70a20184e8fff3c821a04
                                          • Opcode Fuzzy Hash: a218cfe41a6cb7ab304e42fff14fde6f2b97d82409eca73fb501d3ce0487613f
                                          • Instruction Fuzzy Hash: 48E0E275D40209CFD704DFA4E198AADBBB0EB08720F208499D816AB260CB34A904CFA0
                                          Uniqueness

                                          Uniqueness Score: -1.00%

                                          Memory Dump Source
                                          • Source File: 00000006.00000002.662984451.0000000005B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B50000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_6_2_5b50000_kmk.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a2ae841b51e12d1c240cd795f338196d101884ebd15a57fcfd099d21c04968e6
                                          • Instruction ID: fc9e15a02fec1394a84f7b314ae6b0f4a83becae62284e04b4fda04c5a7082eb
                                          • Opcode Fuzzy Hash: a2ae841b51e12d1c240cd795f338196d101884ebd15a57fcfd099d21c04968e6
                                          • Instruction Fuzzy Hash: 44C08C322023249BC72427B9B9086963BEDDF8A222B000076E209C2700CABB8C0087E0
                                          Uniqueness

                                          Uniqueness Score: -1.00%