Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z17invoice.exe

Overview

General Information

Sample name:z17invoice.exe
Analysis ID:1504031
MD5:c418187a5268d408094b89aa79e3a5a2
SHA1:a5a24c8aeef29107cb3a72acbe45d77274ee3cf9
SHA256:66f51ee1deb34f149491e55735e671876e22fe37f749fdfa30238041a35bafc6
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • z17invoice.exe (PID: 6332 cmdline: "C:\Users\user\Desktop\z17invoice.exe" MD5: C418187A5268D408094B89AA79E3A5A2)
    • powershell.exe (PID: 3992 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 5604 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • z17invoice.exe (PID: 5752 cmdline: "C:\Users\user\Desktop\z17invoice.exe" MD5: C418187A5268D408094B89AA79E3A5A2)
  • mpTrle.exe (PID: 5668 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: C418187A5268D408094B89AA79E3A5A2)
    • mpTrle.exe (PID: 1864 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: C418187A5268D408094B89AA79E3A5A2)
  • mpTrle.exe (PID: 5036 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: C418187A5268D408094B89AA79E3A5A2)
    • mpTrle.exe (PID: 4088 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: C418187A5268D408094B89AA79E3A5A2)
    • mpTrle.exe (PID: 4120 cmdline: "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe" MD5: C418187A5268D408094B89AA79E3A5A2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "wethem@aklaneah-sa.com", "Password": "Password:  )NYyffR0   "}
SourceRuleDescriptionAuthorStrings
0000000C.00000002.3282236236.000000000339C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.3283273481.00000000033D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.3283273481.00000000033D1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 30 entries
            SourceRuleDescriptionAuthorStrings
            7.2.mpTrle.exe.3702270.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              7.2.mpTrle.exe.3702270.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                7.2.mpTrle.exe.3702270.4.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x31bd0:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x31c42:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x31ccc:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x31d5e:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x31dc8:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x31e3a:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x31ed0:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x31f60:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                7.2.mpTrle.exe.377bef0.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  7.2.mpTrle.exe.377bef0.5.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 33 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\z17invoice.exe", ParentImage: C:\Users\user\Desktop\z17invoice.exe, ParentProcessId: 6332, ParentProcessName: z17invoice.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe", ProcessId: 3992, ProcessName: powershell.exe
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\z17invoice.exe, ProcessId: 5752, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mpTrle
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\z17invoice.exe", ParentImage: C:\Users\user\Desktop\z17invoice.exe, ParentProcessId: 6332, ParentProcessName: z17invoice.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe", ProcessId: 3992, ProcessName: powershell.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 208.91.198.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\z17invoice.exe, Initiated: true, ProcessId: 5752, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49708
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\z17invoice.exe", ParentImage: C:\Users\user\Desktop\z17invoice.exe, ParentProcessId: 6332, ParentProcessName: z17invoice.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe", ProcessId: 3992, ProcessName: powershell.exe
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 10.2.mpTrle.exe.3730d98.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "us2.smtp.mailhostbox.com", "Username": "wethem@aklaneah-sa.com", "Password": "Password: )NYyffR0 "}
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeReversingLabs: Detection: 65%
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeVirustotal: Detection: 60%Perma Link
                    Source: z17invoice.exeVirustotal: Detection: 60%Perma Link
                    Source: z17invoice.exeReversingLabs: Detection: 65%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeJoe Sandbox ML: detected
                    Source: z17invoice.exeJoe Sandbox ML: detected
                    Source: z17invoice.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49711 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49720 version: TLS 1.2
                    Source: z17invoice.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: GRXq.pdb source: z17invoice.exe, mpTrle.exe.4.dr
                    Source: Binary string: GRXq.pdbSHA256 source: z17invoice.exe, mpTrle.exe.4.dr
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4x nop then jmp 0B880C4Bh0_2_0B880323
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4x nop then jmp 0B880C4Bh0_2_0B8803D2
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 4x nop then jmp 08080C4Bh7_2_080803D2
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 4x nop then jmp 06C80C4Bh10_2_06C803D2

                    Networking

                    barindex
                    Source: Yara matchFile source: 0.2.z17invoice.exe.372b210.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.5:49708 -> 208.91.198.143:587
                    Source: Joe Sandbox ViewIP Address: 208.91.198.143 208.91.198.143
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
                    Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.5:49708 -> 208.91.198.143:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: us2.smtp.mailhostbox.com
                    Source: z17invoice.exe, 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3300916961.0000000006A10000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3300128980.0000000006A26000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3301136987.0000000006A60000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: z17invoice.exe, 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3301136987.0000000006A60000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                    Source: z17invoice.exe, 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3300916961.0000000006A10000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: z17invoice.exe, 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3301136987.0000000006A60000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
                    Source: z17invoice.exe, 00000000.00000002.2048520162.00000000026C9000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3283273481.0000000003381000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2186069151.0000000002719000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000A.00000002.2274721897.000000000270C000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.000000000332C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: z17invoice.exe, 00000004.00000002.3283273481.00000000033FC000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.000000000312C000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.000000000339C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
                    Source: z17invoice.exe, 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2187583552.0000000003702000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2187583552.000000000377B000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3278015316.0000000000429000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 0000000A.00000002.2281400349.0000000003730000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: z17invoice.exe, 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3283273481.0000000003381000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2187583552.0000000003702000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2187583552.000000000377B000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3278015316.0000000000429000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 0000000A.00000002.2281400349.0000000003730000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.000000000332C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: z17invoice.exe, 00000004.00000002.3283273481.0000000003381000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.000000000332C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: z17invoice.exe, 00000004.00000002.3283273481.0000000003381000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.000000000332C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: z17invoice.exe, 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3301136987.0000000006A60000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49711 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:49720 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, 3DlgK9re6m.cs.Net Code: sIJKyc
                    Source: 0.2.z17invoice.exe.372b210.3.raw.unpack, 3DlgK9re6m.cs.Net Code: sIJKyc
                    Source: 7.2.mpTrle.exe.377bef0.5.raw.unpack, 3DlgK9re6m.cs.Net Code: sIJKyc

                    System Summary

                    barindex
                    Source: 7.2.mpTrle.exe.3702270.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 7.2.mpTrle.exe.377bef0.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.mpTrle.exe.376bdb8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.mpTrle.exe.3730d98.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 7.2.mpTrle.exe.3702270.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.z17invoice.exe.36f01f0.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.z17invoice.exe.372b210.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 7.2.mpTrle.exe.377bef0.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.mpTrle.exe.376bdb8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 10.2.mpTrle.exe.3730d98.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.z17invoice.exe.372b210.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: z17invoice.exe
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 0_2_0263D5BC0_2_0263D5BC
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 0_2_04B900060_2_04B90006
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 0_2_04B900400_2_04B90040
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 0_2_0B8824680_2_0B882468
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_0179E3E04_2_0179E3E0
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_01794AD04_2_01794AD0
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_01793EB84_2_01793EB8
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_0179F1BB4_2_0179F1BB
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_0179B3084_2_0179B308
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_017942004_2_01794200
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_017919E84_2_017919E8
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_01791ADD4_2_01791ADD
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_0711C5204_2_0711C520
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_0711AEFC4_2_0711AEFC
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_0717C5684_2_0717C568
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_071755C84_2_071755C8
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_071765E04_2_071765E0
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_071734884_2_07173488
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_0717B2124_2_0717B212
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_07177D684_2_07177D68
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_07175CD74_2_07175CD7
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_071776884_2_07177688
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_071700064_2_07170006
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_071700404_2_07170040
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_0717EA484_2_0717EA48
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_00D3D5BC7_2_00D3D5BC
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AE87107_2_06AE8710
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AE6D097_2_06AE6D09
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AEB7007_2_06AEB700
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AE87007_2_06AE8700
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AED7707_2_06AED770
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AEB2C27_2_06AEB2C2
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AED3387_2_06AED338
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AE6D947_2_06AE6D94
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AEBB297_2_06AEBB29
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_06AEBB387_2_06AEBB38
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_080824687_2_08082468
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_0308EAD88_2_0308EAD8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_03084AD08_2_03084AD0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_03083EB88_2_03083EB8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_0308AD088_2_0308AD08
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_030842008_2_03084200
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E1ACDC8_2_06E1ACDC
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E196B08_2_06E196B0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E1DBF08_2_06E1DBF0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E234908_2_06E23490
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E265E88_2_06E265E8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E255D08_2_06E255D0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E2B2208_2_06E2B220
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E2C1788_2_06E2C178
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E27D708_2_06E27D70
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E276908_2_06E27690
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E2E3988_2_06E2E398
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E200408_2_06E20040
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E25CDF8_2_06E25CDF
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_00C9D5BC10_2_00C9D5BC
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_06C8252810_2_06C82528
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_081A6D0910_2_081A6D09
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_081A871010_2_081A8710
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_081ABB3810_2_081ABB38
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_081ABB2910_2_081ABB29
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_081AD33810_2_081AD338
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_081A86D910_2_081A86D9
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_081AB70010_2_081AB700
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_081AD77010_2_081AD770
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_03134AD012_2_03134AD0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_0313EAD812_2_0313EAD8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_03133EB812_2_03133EB8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_0313420012_2_03134200
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_0313AD0812_2_0313AD08
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E4ACDC12_2_06E4ACDC
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E4C05012_2_06E4C050
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E496B012_2_06E496B0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E4DBF012_2_06E4DBF0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E6349012_2_06E63490
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E665E812_2_06E665E8
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E655D012_2_06E655D0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E6B22012_2_06E6B220
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E6C17812_2_06E6C178
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E67D7012_2_06E67D70
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E6769012_2_06E67690
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E6E39812_2_06E6E398
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E6004012_2_06E60040
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 12_2_06E65CDF12_2_06E65CDF
                    Source: z17invoice.exe, 00000000.00000002.2055901739.0000000004F60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs z17invoice.exe
                    Source: z17invoice.exe, 00000000.00000002.2057277569.000000000851F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXE.MUIj% vs z17invoice.exe
                    Source: z17invoice.exe, 00000000.00000002.2057016131.0000000006C80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs z17invoice.exe
                    Source: z17invoice.exe, 00000000.00000002.2048520162.000000000271A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename64af20ca-f267-4570-b8a1-6b375e9c5566.exe4 vs z17invoice.exe
                    Source: z17invoice.exe, 00000000.00000000.2015838963.0000000000308000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameGRXq.exe: vs z17invoice.exe
                    Source: z17invoice.exe, 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename64af20ca-f267-4570-b8a1-6b375e9c5566.exe4 vs z17invoice.exe
                    Source: z17invoice.exe, 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs z17invoice.exe
                    Source: z17invoice.exe, 00000000.00000002.2047046988.00000000009AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs z17invoice.exe
                    Source: z17invoice.exe, 00000000.00000002.2048520162.0000000002671000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs z17invoice.exe
                    Source: z17invoice.exe, 00000000.00000002.2048520162.0000000002766000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGB-lesson-forms.dll@ vs z17invoice.exe
                    Source: z17invoice.exe, 00000004.00000002.3278441154.00000000011D8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs z17invoice.exe
                    Source: z17invoice.exeBinary or memory string: OriginalFilenameGRXq.exe: vs z17invoice.exe
                    Source: z17invoice.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 7.2.mpTrle.exe.3702270.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 7.2.mpTrle.exe.377bef0.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.mpTrle.exe.376bdb8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.mpTrle.exe.3730d98.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 7.2.mpTrle.exe.3702270.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.z17invoice.exe.36f01f0.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.z17invoice.exe.372b210.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 7.2.mpTrle.exe.377bef0.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.mpTrle.exe.376bdb8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 10.2.mpTrle.exe.3730d98.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.z17invoice.exe.372b210.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: z17invoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: mpTrle.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, slKb.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, mAKJ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, xQRSe0Fg.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, n3rhMa.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, MQzE4FWn.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, nSmgRyX5a1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, 6IMLmJtk.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, 3HroK7qN.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, vFeqA82BFuFxdDMn8X.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, vFeqA82BFuFxdDMn8X.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, vFeqA82BFuFxdDMn8X.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, vFeqA82BFuFxdDMn8X.csSecurity API names: _0020.SetAccessControl
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, vFeqA82BFuFxdDMn8X.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, vFeqA82BFuFxdDMn8X.csSecurity API names: _0020.AddAccessRule
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, nEJ4ZgpnZN1celwi9K.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, nEJ4ZgpnZN1celwi9K.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@15/9@2/2
                    Source: C:\Users\user\Desktop\z17invoice.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\z17invoice.exe.logJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMutant created: NULL
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMutant created: \Sessions\1\BaseNamedObjects\ITbyrwULeTDq
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1196:120:WilError_03
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vdwpu5sl.hle.ps1Jump to behavior
                    Source: z17invoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: z17invoice.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\z17invoice.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\z17invoice.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\z17invoice.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: z17invoice.exeVirustotal: Detection: 60%
                    Source: z17invoice.exeReversingLabs: Detection: 65%
                    Source: C:\Users\user\Desktop\z17invoice.exeFile read: C:\Users\user\Desktop\z17invoice.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\z17invoice.exe "C:\Users\user\Desktop\z17invoice.exe"
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe"
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess created: C:\Users\user\Desktop\z17invoice.exe "C:\Users\user\Desktop\z17invoice.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess created: C:\Users\user\Desktop\z17invoice.exe "C:\Users\user\Desktop\z17invoice.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                    Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dwrite.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: textshaping.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windowscodecs.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: version.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wldp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: profapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wbemcomn.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: amsi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: userenv.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasman.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: secur32.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: schannel.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: gpapi.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: vaultcli.dll
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeSection loaded: wintypes.dll
                    Source: C:\Users\user\Desktop\z17invoice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\z17invoice.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: z17invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: z17invoice.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: z17invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: GRXq.pdb source: z17invoice.exe, mpTrle.exe.4.dr
                    Source: Binary string: GRXq.pdbSHA256 source: z17invoice.exe, mpTrle.exe.4.dr

                    Data Obfuscation

                    barindex
                    Source: z17invoice.exe, MainForm.cs.Net Code: InitializeComponent
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, vFeqA82BFuFxdDMn8X.cs.Net Code: DQ2gFg7MWN System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, vFeqA82BFuFxdDMn8X.cs.Net Code: DQ2gFg7MWN System.Reflection.Assembly.Load(byte[])
                    Source: mpTrle.exe.4.dr, MainForm.cs.Net Code: InitializeComponent
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 0_2_02639C40 push 5004B093h; iretd 0_2_02639C6D
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_07114F00 push esp; retf 4_2_07114F0D
                    Source: C:\Users\user\Desktop\z17invoice.exeCode function: 4_2_0717E1A5 pushad ; ret 4_2_0717E1AD
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_00D3B311 push 14418B02h; ret 7_2_00D3B323
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 7_2_00D3B4C0 push 18418B02h; ret 7_2_00D3B723
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_03080C55 push edi; retf 8_2_03080C7A
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E153E0 push es; ret 8_2_06E153F0
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 8_2_06E1FEFB push es; retf 8_2_06E1FEFC
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_00C901B5 push esp; iretd 10_2_00C901B3
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_00C9CEE5 push 4B18B902h; retf 10_2_00C9CEFB
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_00C992EA push ebp; retf 10_2_00C992EB
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_00C9B311 push 14418B02h; ret 10_2_00C9B323
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeCode function: 10_2_00C9B4C0 push 18418B02h; ret 10_2_00C9B723
                    Source: z17invoice.exeStatic PE information: section name: .text entropy: 7.782349079077635
                    Source: mpTrle.exe.4.drStatic PE information: section name: .text entropy: 7.782349079077635
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, BWNUv2gwCEuXu9LVyY.csHigh entropy of concatenated method names: 'EnD1bEJ4Zg', 'eZN121celw', 'xdM1PCnOkV', 'FnQ18l5n81', 'DGo1Ug9HiE', 'OlC1mis6uZ', 'PMeAlpoCwGZ82KMi8g', 'YVW5kqI4OcCoqRHSOX', 'JMy11N4hns', 'IDa1fKP3Na'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, hn81N8S7ehdR5KGog9.csHigh entropy of concatenated method names: 'mQk54BThYJ', 'Pyf5KyMxjA', 'aFw9VwSaRZ', 'o1D9RAbZUe', 'cQe9hyZpn7', 'NSq9Okg9I0', 'YpQ9eOtic6', 'biM9snTobq', 'svt96k7ZVh', 'QlD9NKadBx'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, TpMpwXHSGkeuOiaAKU.csHigh entropy of concatenated method names: 'B66Fv5HFh', 'RhvvidH0Y', 'VkQY37tfq', 'vqkKYOyFB', 'c5Bagw6cH', 'F7kSRCMTq', 'uTiqGvn6A65iXbd7bT', 'CYMs6UJMokTE3xHusc', 'OWeEEH84g', 'PyH01c0Wb'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, chSg2oadMCnOkVqnQl.csHigh entropy of concatenated method names: 'xxH9vWeVnq', 'A7w9YEbkJE', 'P969p3B6ks', 'hbe9a7mZbM', 'Rhn9UDZJiq', 'JhI9m2Q228', 'abv9wEBaSa', 'v079EIMNTG', 'C8b9GVdW2j', 'HYj90FijEB'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, b4bRv0zdV5wjVSX1OY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'sjkGDKjI3o', 'RvqGUloArG', 'MhpGmj6I02', 'USfGwYbUxN', 'JPDGEPJGdh', 'bXvGGEEZoB', 'OIOG0droRM'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, nt6tW0XRD2x6gaLGVp.csHigh entropy of concatenated method names: 'Dispose', 'oRy1ASpbS6', 'TGdHBY4et7', 'xaQYY6STOO', 'M7Y1tYhlXQ', 'L5i1zYBSFY', 'ProcessDialogKey', 'fpLHZHEUL0', 'DPnH15RyJh', 'L36HHxKcbr'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, NZqP6M1ZqQhdWeT0l53.csHigh entropy of concatenated method names: 'xUBGrJrKaO', 'qwaGyKPZrO', 'WFNGFZWmb3', 'kl3Gvg1S7L', 'pFLG4CyD08', 'VfZGYZwu6C', 'zyUGKiX4ux', 'cgXGplDSQx', 'T06GaOP1T4', 'tbXGSmSo4T'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, biEIlCqis6uZnAVSd1.csHigh entropy of concatenated method names: 'HUkLnkiOiB', 'DEhLXAuv0E', 'pAFL507iBm', 'lMdLbFxQrR', 'x2fL2fluQU', 'tS65WkP2eg', 'mkx53VT9ak', 'Ly45CYjNSq', 'pNq5TBFN5K', 'r7R5AcBuqF'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, ogcLX6cEhD4FYcl23J.csHigh entropy of concatenated method names: 'Y7qwP5l516', 'Kxkw88dA2j', 'ToString', 'PaRwJhNfQJ', 'Kv1wXmSFER', 'jYBw9HwNGu', 'VC2w5nqWGu', 'FEDwLrf0Yl', 'KM2wb2iSNB', 'uorw2ZfxTb'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, nEJ4ZgpnZN1celwi9K.csHigh entropy of concatenated method names: 'w8rXuC7sda', 'bQYXi1b15u', 'd6pXQWn3Re', 'Er2Xc4miCF', 'i3JXWCdrPV', 'pkZX3UEv5k', 'LLfXCYSaHU', 'XCuXTyYram', 'uNpXAdakSW', 'QOIXtnXJTV'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, XARcRsdajvftnYXJ7A.csHigh entropy of concatenated method names: 'pijDpMn1Xl', 'eZGDaYFKac', 'EDFDqnsbBN', 'IJIDBy0VyD', 'rqoDRjUnKV', 'WmYDhoNxLp', 'tTRDe796ui', 'UHEDsuSho2', 'PIADN8S6T4', 'gOLDIYG7xg'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, zfpHmGu5eZlB2kBdMT.csHigh entropy of concatenated method names: 'OwNUNBefY3', 'zxtUjYYCWc', 'YkqUu7IZMU', 'YMEUi6Nudy', 'bgVUBiPk1u', 'mIMUVbgCBK', 'uxDURK1gV7', 'IRCUhsoBx3', 'geoUOI1Lgq', 'ztoUeY6Hki'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, u4Ph2Y3HEGsTn4EA2K.csHigh entropy of concatenated method names: 'PnKwTmhqXm', 'todwtqsFIr', 'QXVEZ4enei', 'nMLE1ZHWY3', 's8YwIQnEa4', 'FWCwjkw4sf', 'NK4wdfsZFq', 'LZ8wuDQV86', 'L5Qwi146fH', 'nmbwQYk6vN'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, cY4AorQTkcdQE1Wmpe.csHigh entropy of concatenated method names: 'ToString', 'mxYmIQY1IG', 'LLrmBAtNPu', 'wqKmVgJJ89', 'sFGmRKBLpx', 'aepmhC90HR', 'SCOmO7okiB', 'qDPme0noiH', 'r96msLOcwp', 'xTem6YJDgJ'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, ulp53J1f7ZkodXvaeqN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'nJh0udfGrT', 'jSb0iwvBNu', 'bUj0QWwmjE', 'XGL0crY2L6', 'hdG0WrG16G', 'xXM03TR9vX', 'MUV0Cygx9g'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, vFeqA82BFuFxdDMn8X.csHigh entropy of concatenated method names: 'fMMfnlUbuh', 'eXJfJFmGCV', 'TbHfXdC8sj', 'MTxf9xYh0a', 'NXhf5Y2mMF', 'jllfL9EOYs', 'mWMfbVr418', 'mN4f2FZx30', 'lVTfM9wSRi', 'RA1fPXV82D'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, tKcbrHtrpXPIMte5WL.csHigh entropy of concatenated method names: 'UZkG1oVIv0', 'FwHGfWrB3P', 'vCnGgaA3oy', 'KtyGJXFg07', 'MHQGXTeYUr', 'cf6G58u3xA', 'MZnGLNV8m6', 'AolECTXPiO', 'SqDETXtun0', 'x9AEAmyJyF'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, Vq1ouwekWox4TPejHk.csHigh entropy of concatenated method names: 'IGKbJKnYf7', 'ofTb9ynX8j', 'GVNbL3ElLF', 'EVjLt1grsO', 'tIkLz2Syvx', 'wtSbZwWGpT', 'Ts1b1cglLJ', 'A1ObHIKlj7', 'uTKbfpNydL', 'd19bglmB0X'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, iHEUL0AKPn5RyJhs36.csHigh entropy of concatenated method names: 'VbEEqWHyYq', 'WD0EBq9DjD', 'RANEVlPvOt', 'KPfERNpynu', 'mXFEuAFtr3', 'NmoEhLdxWh', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, uYYhlXTQe5iYBSFYJp.csHigh entropy of concatenated method names: 'Vj4EJZStBH', 'uvyEXqCbtV', 'JaeE9dv98w', 'TL2E5afikF', 'simELOkdFG', 'rGhEbSMTD7', 'uZtE2DxaXn', 'PCHEM33g3F', 'dp5EP3nx94', 'LB9E8014Ss'
                    Source: 0.2.z17invoice.exe.6c80000.6.raw.unpack, SgMKSW6lV3WxejO7di.csHigh entropy of concatenated method names: 'opybrjecXB', 'CoqbyCPFAH', 'xoGbFeE0VI', 'J7MbvSZl6l', 'wIeb4SYBj1', 'rHIbYm7Klm', 'hWRbKRLPnI', 'VkibpdMy1P', 'H7PbaNlq9V', 'pxibSnpyB5'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, BWNUv2gwCEuXu9LVyY.csHigh entropy of concatenated method names: 'EnD1bEJ4Zg', 'eZN121celw', 'xdM1PCnOkV', 'FnQ18l5n81', 'DGo1Ug9HiE', 'OlC1mis6uZ', 'PMeAlpoCwGZ82KMi8g', 'YVW5kqI4OcCoqRHSOX', 'JMy11N4hns', 'IDa1fKP3Na'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, hn81N8S7ehdR5KGog9.csHigh entropy of concatenated method names: 'mQk54BThYJ', 'Pyf5KyMxjA', 'aFw9VwSaRZ', 'o1D9RAbZUe', 'cQe9hyZpn7', 'NSq9Okg9I0', 'YpQ9eOtic6', 'biM9snTobq', 'svt96k7ZVh', 'QlD9NKadBx'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, TpMpwXHSGkeuOiaAKU.csHigh entropy of concatenated method names: 'B66Fv5HFh', 'RhvvidH0Y', 'VkQY37tfq', 'vqkKYOyFB', 'c5Bagw6cH', 'F7kSRCMTq', 'uTiqGvn6A65iXbd7bT', 'CYMs6UJMokTE3xHusc', 'OWeEEH84g', 'PyH01c0Wb'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, chSg2oadMCnOkVqnQl.csHigh entropy of concatenated method names: 'xxH9vWeVnq', 'A7w9YEbkJE', 'P969p3B6ks', 'hbe9a7mZbM', 'Rhn9UDZJiq', 'JhI9m2Q228', 'abv9wEBaSa', 'v079EIMNTG', 'C8b9GVdW2j', 'HYj90FijEB'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, b4bRv0zdV5wjVSX1OY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'sjkGDKjI3o', 'RvqGUloArG', 'MhpGmj6I02', 'USfGwYbUxN', 'JPDGEPJGdh', 'bXvGGEEZoB', 'OIOG0droRM'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, nt6tW0XRD2x6gaLGVp.csHigh entropy of concatenated method names: 'Dispose', 'oRy1ASpbS6', 'TGdHBY4et7', 'xaQYY6STOO', 'M7Y1tYhlXQ', 'L5i1zYBSFY', 'ProcessDialogKey', 'fpLHZHEUL0', 'DPnH15RyJh', 'L36HHxKcbr'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, NZqP6M1ZqQhdWeT0l53.csHigh entropy of concatenated method names: 'xUBGrJrKaO', 'qwaGyKPZrO', 'WFNGFZWmb3', 'kl3Gvg1S7L', 'pFLG4CyD08', 'VfZGYZwu6C', 'zyUGKiX4ux', 'cgXGplDSQx', 'T06GaOP1T4', 'tbXGSmSo4T'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, biEIlCqis6uZnAVSd1.csHigh entropy of concatenated method names: 'HUkLnkiOiB', 'DEhLXAuv0E', 'pAFL507iBm', 'lMdLbFxQrR', 'x2fL2fluQU', 'tS65WkP2eg', 'mkx53VT9ak', 'Ly45CYjNSq', 'pNq5TBFN5K', 'r7R5AcBuqF'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, ogcLX6cEhD4FYcl23J.csHigh entropy of concatenated method names: 'Y7qwP5l516', 'Kxkw88dA2j', 'ToString', 'PaRwJhNfQJ', 'Kv1wXmSFER', 'jYBw9HwNGu', 'VC2w5nqWGu', 'FEDwLrf0Yl', 'KM2wb2iSNB', 'uorw2ZfxTb'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, nEJ4ZgpnZN1celwi9K.csHigh entropy of concatenated method names: 'w8rXuC7sda', 'bQYXi1b15u', 'd6pXQWn3Re', 'Er2Xc4miCF', 'i3JXWCdrPV', 'pkZX3UEv5k', 'LLfXCYSaHU', 'XCuXTyYram', 'uNpXAdakSW', 'QOIXtnXJTV'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, XARcRsdajvftnYXJ7A.csHigh entropy of concatenated method names: 'pijDpMn1Xl', 'eZGDaYFKac', 'EDFDqnsbBN', 'IJIDBy0VyD', 'rqoDRjUnKV', 'WmYDhoNxLp', 'tTRDe796ui', 'UHEDsuSho2', 'PIADN8S6T4', 'gOLDIYG7xg'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, zfpHmGu5eZlB2kBdMT.csHigh entropy of concatenated method names: 'OwNUNBefY3', 'zxtUjYYCWc', 'YkqUu7IZMU', 'YMEUi6Nudy', 'bgVUBiPk1u', 'mIMUVbgCBK', 'uxDURK1gV7', 'IRCUhsoBx3', 'geoUOI1Lgq', 'ztoUeY6Hki'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, u4Ph2Y3HEGsTn4EA2K.csHigh entropy of concatenated method names: 'PnKwTmhqXm', 'todwtqsFIr', 'QXVEZ4enei', 'nMLE1ZHWY3', 's8YwIQnEa4', 'FWCwjkw4sf', 'NK4wdfsZFq', 'LZ8wuDQV86', 'L5Qwi146fH', 'nmbwQYk6vN'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, cY4AorQTkcdQE1Wmpe.csHigh entropy of concatenated method names: 'ToString', 'mxYmIQY1IG', 'LLrmBAtNPu', 'wqKmVgJJ89', 'sFGmRKBLpx', 'aepmhC90HR', 'SCOmO7okiB', 'qDPme0noiH', 'r96msLOcwp', 'xTem6YJDgJ'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, ulp53J1f7ZkodXvaeqN.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'nJh0udfGrT', 'jSb0iwvBNu', 'bUj0QWwmjE', 'XGL0crY2L6', 'hdG0WrG16G', 'xXM03TR9vX', 'MUV0Cygx9g'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, vFeqA82BFuFxdDMn8X.csHigh entropy of concatenated method names: 'fMMfnlUbuh', 'eXJfJFmGCV', 'TbHfXdC8sj', 'MTxf9xYh0a', 'NXhf5Y2mMF', 'jllfL9EOYs', 'mWMfbVr418', 'mN4f2FZx30', 'lVTfM9wSRi', 'RA1fPXV82D'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, tKcbrHtrpXPIMte5WL.csHigh entropy of concatenated method names: 'UZkG1oVIv0', 'FwHGfWrB3P', 'vCnGgaA3oy', 'KtyGJXFg07', 'MHQGXTeYUr', 'cf6G58u3xA', 'MZnGLNV8m6', 'AolECTXPiO', 'SqDETXtun0', 'x9AEAmyJyF'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, Vq1ouwekWox4TPejHk.csHigh entropy of concatenated method names: 'IGKbJKnYf7', 'ofTb9ynX8j', 'GVNbL3ElLF', 'EVjLt1grsO', 'tIkLz2Syvx', 'wtSbZwWGpT', 'Ts1b1cglLJ', 'A1ObHIKlj7', 'uTKbfpNydL', 'd19bglmB0X'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, iHEUL0AKPn5RyJhs36.csHigh entropy of concatenated method names: 'VbEEqWHyYq', 'WD0EBq9DjD', 'RANEVlPvOt', 'KPfERNpynu', 'mXFEuAFtr3', 'NmoEhLdxWh', 'Next', 'Next', 'Next', 'NextBytes'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, uYYhlXTQe5iYBSFYJp.csHigh entropy of concatenated method names: 'Vj4EJZStBH', 'uvyEXqCbtV', 'JaeE9dv98w', 'TL2E5afikF', 'simELOkdFG', 'rGhEbSMTD7', 'uZtE2DxaXn', 'PCHEM33g3F', 'dp5EP3nx94', 'LB9E8014Ss'
                    Source: 0.2.z17invoice.exe.389a7b0.2.raw.unpack, SgMKSW6lV3WxejO7di.csHigh entropy of concatenated method names: 'opybrjecXB', 'CoqbyCPFAH', 'xoGbFeE0VI', 'J7MbvSZl6l', 'wIeb4SYBj1', 'rHIbYm7Klm', 'hWRbKRLPnI', 'VkibpdMy1P', 'H7PbaNlq9V', 'pxibSnpyB5'
                    Source: C:\Users\user\Desktop\z17invoice.exeFile created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeJump to dropped file
                    Source: C:\Users\user\Desktop\z17invoice.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run mpTrleJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run mpTrleJump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\z17invoice.exeFile opened: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe:Zone.Identifier read attributes | deleteJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: z17invoice.exe PID: 6332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 5668, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\z17invoice.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: 2420000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: 2670000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: 2420000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: 87F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: 97F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: 99F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: A9F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: 1790000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: 3380000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: 5380000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: CD0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 26C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 46C0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 8120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 9120000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 9300000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: A300000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 17A0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 30B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 50B0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: C50000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 26B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 2590000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 81B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 91B0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 93A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: A3A0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 17E0000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 3320000 memory reserve | memory write watch
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory allocated: 3170000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6183Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3401Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeWindow / User API: threadDelayed 1747Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeWindow / User API: threadDelayed 4429Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWindow / User API: threadDelayed 1120Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWindow / User API: threadDelayed 4360Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWindow / User API: threadDelayed 3185
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWindow / User API: threadDelayed 1852
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 6800Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5876Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -18446744073709540s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 5596Thread sleep count: 1747 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -99891s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 5596Thread sleep count: 4429 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -99779s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -99672s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -99562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -99453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -99337s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -99222s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -99047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -98930s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -98787s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -98656s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -98547s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -98437s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -98328s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -98219s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -98109s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97998s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -97015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -96906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -96797s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -96687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exe TID: 1352Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4088Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 904Thread sleep count: 1120 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -99891s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 904Thread sleep count: 4360 > 30Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -99766s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -99656s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -99546s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -99438s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -99316s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -99188s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -99062s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -98953s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -98844s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -98734s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -98625s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -98516s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -98406s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -98297s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -98188s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -98063s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -97938s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -97813s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -97703s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -97594s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -97469s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -97359s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -97250s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -97141s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -97032s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 4484Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 2764Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -14757395258967632s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 2616Thread sleep count: 3185 > 30
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -99890s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 2616Thread sleep count: 1852 > 30
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -99781s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -99671s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -99562s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -99453s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -99343s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -99233s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -99124s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -99015s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -98906s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -98796s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -98687s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -98578s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -98468s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -98359s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -98246s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -98140s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -98031s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -97921s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -97812s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -97701s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -97593s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -97484s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -97374s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe TID: 6084Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\z17invoice.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\z17invoice.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\z17invoice.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 99779Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 99672Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 99453Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 99337Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 99222Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 99047Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 98930Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 98787Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 98656Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 98547Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 98437Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 98328Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 98219Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 98109Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97998Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97890Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97781Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97671Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97562Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97453Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97343Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97234Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97125Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 97015Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 96906Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 96797Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 96687Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99891Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99656Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99546Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99438Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99316Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99188Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99062Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98953Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98844Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98734Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98625Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98516Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98406Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98297Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98188Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98063Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97938Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97813Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97703Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97594Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97469Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97359Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97250Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97141Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97032Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99890
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99781
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99671
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99562
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99453
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99343
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99233
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99124
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 99015
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98906
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98796
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98687
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98578
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98468
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98359
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98246
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98140
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 98031
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97921
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97812
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97701
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97593
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97484
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 97374
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeThread delayed: delay time: 922337203685477
                    Source: mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
                    Source: z17invoice.exe, 00000000.00000002.2047046988.00000000009E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                    Source: mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>
                    Source: z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe"
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory written: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeMemory written: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeProcess created: C:\Users\user\Desktop\z17invoice.exe "C:\Users\user\Desktop\z17invoice.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"Jump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeProcess created: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe "C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Users\user\Desktop\z17invoice.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Users\user\Desktop\z17invoice.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\z17invoice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 7.2.mpTrle.exe.3702270.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.mpTrle.exe.377bef0.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.376bdb8.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.3730d98.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.mpTrle.exe.3702270.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.36f01f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.372b210.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.mpTrle.exe.377bef0.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.376bdb8.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.3730d98.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.372b210.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.3282236236.000000000339C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3283273481.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2281400349.0000000003730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3281780432.000000000312C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2187583552.000000000377B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3282236236.0000000003371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2187583552.0000000003702000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3281780432.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3283273481.00000000033FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3278015316.0000000000429000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z17invoice.exe PID: 6332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: z17invoice.exe PID: 5752, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 5668, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 1864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 5036, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 4120, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\z17invoice.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\FTP Navigator\Ftplist.txt
                    Source: C:\Users\user\Desktop\z17invoice.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\z17invoice.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 7.2.mpTrle.exe.3702270.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.mpTrle.exe.377bef0.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.376bdb8.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.3730d98.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.mpTrle.exe.3702270.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.36f01f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.372b210.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.mpTrle.exe.377bef0.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.376bdb8.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.3730d98.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.372b210.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3283273481.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2281400349.0000000003730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2187583552.000000000377B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3282236236.0000000003371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2187583552.0000000003702000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3281780432.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z17invoice.exe PID: 6332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: z17invoice.exe PID: 5752, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 5668, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 1864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 5036, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 4120, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 7.2.mpTrle.exe.3702270.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.mpTrle.exe.377bef0.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.376bdb8.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.3730d98.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.mpTrle.exe.3702270.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.36f01f0.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.372b210.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.mpTrle.exe.377bef0.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.376bdb8.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 10.2.mpTrle.exe.3730d98.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.372b210.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.z17invoice.exe.36f01f0.4.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000002.3282236236.000000000339C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3283273481.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000A.00000002.2281400349.0000000003730000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3281780432.000000000312C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2187583552.000000000377B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.3282236236.0000000003371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2187583552.0000000003702000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3281780432.0000000003101000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3283273481.00000000033FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000008.00000002.3278015316.0000000000429000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: z17invoice.exe PID: 6332, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: z17invoice.exe PID: 5752, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 5668, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 1864, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 5036, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: mpTrle.exe PID: 4120, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    Registry Run Keys / Startup Folder
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    24
                    System Information Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    Registry Run Keys / Startup Folder
                    3
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    1
                    Query Registry
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                    Software Packing
                    NTDS211
                    Security Software Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Process Discovery
                    SSHKeylogging23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    Masquerading
                    Cached Domain Credentials141
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items141
                    Virtualization/Sandbox Evasion
                    DCSync1
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                    Process Injection
                    Proc Filesystem1
                    System Network Configuration Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                    Hidden Files and Directories
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1504031 Sample: z17invoice.exe Startdate: 04/09/2024 Architecture: WINDOWS Score: 100 43 us2.smtp.mailhostbox.com 2->43 45 api.ipify.org 2->45 59 Found malware configuration 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 Multi AV Scanner detection for submitted file 2->63 65 9 other signatures 2->65 8 z17invoice.exe 4 2->8         started        12 mpTrle.exe 3 2->12         started        14 mpTrle.exe 2->14         started        signatures3 process4 file5 37 C:\Users\user\AppData\...\z17invoice.exe.log, ASCII 8->37 dropped 67 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 8->67 69 Adds a directory exclusion to Windows Defender 8->69 16 z17invoice.exe 16 5 8->16         started        21 powershell.exe 23 8->21         started        71 Multi AV Scanner detection for dropped file 12->71 73 Machine Learning detection for dropped file 12->73 75 Injects a PE file into a foreign processes 12->75 23 mpTrle.exe 14 2 12->23         started        25 mpTrle.exe 14->25         started        27 mpTrle.exe 14->27         started        signatures6 process7 dnsIp8 39 us2.smtp.mailhostbox.com 208.91.198.143, 49708, 49712, 49721 PUBLIC-DOMAIN-REGISTRYUS United States 16->39 41 api.ipify.org 172.67.74.152, 443, 49706, 49711 CLOUDFLARENETUS United States 16->41 33 C:\Users\user\AppData\Roaming\...\mpTrle.exe, PE32 16->33 dropped 35 C:\Users\user\...\mpTrle.exe:Zone.Identifier, ASCII 16->35 dropped 47 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->47 49 Tries to steal Mail credentials (via file / registry access) 16->49 51 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->51 53 Loading BitLocker PowerShell Module 21->53 29 conhost.exe 21->29         started        31 WmiPrvSE.exe 21->31         started        55 Tries to harvest and steal ftp login credentials 25->55 57 Tries to harvest and steal browser information (history, passwords, etc) 25->57 file9 signatures10 process11

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    z17invoice.exe61%VirustotalBrowse
                    z17invoice.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTeslaFEM
                    z17invoice.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTeslaFEM
                    C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe61%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    us2.smtp.mailhostbox.com1%VirustotalBrowse
                    api.ipify.org0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org/0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://ocsp.sectigo.com0A0%Avira URL Cloudsafe
                    http://us2.smtp.mailhostbox.com0%Avira URL Cloudsafe
                    http://us2.smtp.mailhostbox.com1%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    us2.smtp.mailhostbox.com
                    208.91.198.143
                    truetrueunknown
                    api.ipify.org
                    172.67.74.152
                    truefalseunknown
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#z17invoice.exe, 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3301136987.0000000006A60000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.sectigo.com0Az17invoice.exe, 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3301136987.0000000006A60000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.ipify.orgz17invoice.exe, 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3283273481.0000000003381000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2187583552.0000000003702000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2187583552.000000000377B000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3278015316.0000000000429000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 0000000A.00000002.2281400349.0000000003730000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.000000000332C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://sectigo.com/CPS0z17invoice.exe, 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3279843502.000000000183C000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3279576468.000000000159E000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3301136987.0000000006A60000.00000004.00000020.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3279660282.00000000016F1000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://account.dyn.com/z17invoice.exe, 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2187583552.0000000003702000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2187583552.000000000377B000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3278015316.0000000000429000.00000040.00000400.00020000.00000000.sdmp, mpTrle.exe, 0000000A.00000002.2281400349.0000000003730000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.org/tz17invoice.exe, 00000004.00000002.3283273481.0000000003381000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.000000000332C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://us2.smtp.mailhostbox.comz17invoice.exe, 00000004.00000002.3283273481.00000000033FC000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.000000000312C000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.000000000339C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namez17invoice.exe, 00000000.00000002.2048520162.00000000026C9000.00000004.00000800.00020000.00000000.sdmp, z17invoice.exe, 00000004.00000002.3283273481.0000000003381000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000007.00000002.2186069151.0000000002719000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 00000008.00000002.3281780432.00000000030B1000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000A.00000002.2274721897.000000000270C000.00000004.00000800.00020000.00000000.sdmp, mpTrle.exe, 0000000C.00000002.3282236236.000000000332C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    208.91.198.143
                    us2.smtp.mailhostbox.comUnited States
                    394695PUBLIC-DOMAIN-REGISTRYUStrue
                    172.67.74.152
                    api.ipify.orgUnited States
                    13335CLOUDFLARENETUSfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1504031
                    Start date and time:2024-09-04 13:00:11 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 7m 29s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:14
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:z17invoice.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@15/9@2/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 97%
                    • Number of executed functions: 269
                    • Number of non-executed functions: 23
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtCreateKey calls found.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    07:00:59API Interceptor31x Sleep call for process: z17invoice.exe modified
                    07:01:01API Interceptor14x Sleep call for process: powershell.exe modified
                    07:01:13API Interceptor54x Sleep call for process: mpTrle.exe modified
                    13:01:04AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run mpTrle C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                    13:01:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run mpTrle C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    208.91.198.143z47maaaaaaaaaaaaax.exeGet hashmaliciousAgentTeslaBrowse
                      SecuriteInfo.com.PDF.Phishing.7B6B.tr.8047.20915.xlsxGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                        product_list.xlsGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                          SecuriteInfo.com.Other.Malware-gen.12504.4949.xlsxGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                            giehjhgjzJ.htaGet hashmaliciousCobalt Strike, MassLogger RAT, Snake KeyloggerBrowse
                              NGL1Of0ZkJ.htaGet hashmaliciousCobalt Strike, AgentTeslaBrowse
                                SecuriteInfo.com.Win32.PWSX-gen.19673.26192.exeGet hashmaliciousAgentTeslaBrowse
                                  Edsha_PO.xlsGet hashmaliciousAgentTeslaBrowse
                                    SecuriteInfo.com.Exploit.CVE-2017-0199.04.Gen.20726.10183.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                      EG240711 EG240712.xlsGet hashmaliciousSnake KeyloggerBrowse
                                        172.67.74.152zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
                                        • api.ipify.org/
                                        FormPlayer.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        PandaClient.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        golang-modules.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        SecuriteInfo.com.Trojan.Win64.Agent.14415.19839.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                                        • api.ipify.org/?format=wef
                                        K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        stub.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        stub.exeGet hashmaliciousUnknownBrowse
                                        • api.ipify.org/
                                        Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                                        • api.ipify.org/?format=json
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        us2.smtp.mailhostbox.comlove.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.225
                                        z47maaaaaaaaaaaaax.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.198.143
                                        z55enyioma.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.224
                                        Statement of Account.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.224
                                        SOA-Al Daleel -Star Electromechanical.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.223
                                        RFQ for RIyadh City Water Line Diversion.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.223
                                        New PO pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.224
                                        SecuriteInfo.com.PDF.Phishing.7B6B.tr.8047.20915.xlsxGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.225
                                        SecuriteInfo.com.Win32.PWSX-gen.25647.23289.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.225
                                        product_list.xlsGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 208.91.199.225
                                        api.ipify.orgPayment Confirmation Documents.vbeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        po89654.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        EVER V-2408 - VESSEL DETAILS.xlsx.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        CSC LEADER VOY.1 PARTICULARS.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        http://ipfs.io/ipns/k51qzi5uqu5dhrye4cl9jgj17k94vzpzjxfa8oougs30gvfbtzu2d60vboy90pGet hashmaliciousHTMLPhisherBrowse
                                        • 104.26.12.205
                                        JAE-2408001146..exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        https://bergtool-my.sharepoint.com/:f:/p/officemgr/EkAEY_TxWUpGjuhgV5jRSO8BD2acB1HjNb72Far_j2tXBg?e=T7fVyKGet hashmaliciousEvilProxyBrowse
                                        • 104.26.13.205
                                        Inquiry PDA (S.S. Pacific Enlighten)_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        • 104.26.12.205
                                        PDA Query - 180397-09-02-2024 Port Agency Appointment.scr.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        love.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        PUBLIC-DOMAIN-REGISTRYUSPO_GM_list_30082024202003180817418300824.exeGet hashmaliciousAgentTeslaBrowse
                                        • 199.79.62.115
                                        love.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.225
                                        QUOTE-4K892388-A-C422.exeGet hashmaliciousAgentTeslaBrowse
                                        • 199.79.62.115
                                        sZlfJ6FDY9.exeGet hashmaliciousAgentTeslaBrowse
                                        • 199.79.62.115
                                        SecuriteInfo.com.Win32.CrypterX-gen.31383.13538.exeGet hashmaliciousAgentTeslaBrowse
                                        • 199.79.62.115
                                        https://ayurvedapancreatitisclinic.com/api/aHR0cHM6Ly9nb29nbGUuY29t&sig=ZDUxNjU0ZTllNzZkYTAxNWE4OTNkZTAyM2ZkZDA1MGViMGIzY2UyOTU1MzY1NGMyNjFlOTExM2ZiMzA5MzdmMg&exp=MTcyNDIzOTUzMQGet hashmaliciousHTMLPhisherBrowse
                                        • 103.21.58.139
                                        UnmxRI.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                        • 119.18.54.85
                                        z47maaaaaaaaaaaaax.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.198.143
                                        Quote# 241048.exeGet hashmaliciousAgentTeslaBrowse
                                        • 199.79.62.115
                                        z55enyioma.exeGet hashmaliciousAgentTeslaBrowse
                                        • 208.91.199.224
                                        CLOUDFLARENETUSPRODUCT LIST.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.97.3
                                        Keyser & Mackay.pdfGet hashmaliciousUnknownBrowse
                                        • 104.17.24.14
                                        QUOTATION_SEPQTRA071244#U00faPDF.scrGet hashmaliciousFormBookBrowse
                                        • 188.114.96.3
                                        AUG 2024 SOA.exeGet hashmaliciousFormBookBrowse
                                        • 172.67.182.66
                                        QUOTATION_SEPQTRA071244#U00faPDF.scrGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        https://www.qrcreator.com/qr/1CFCF746Get hashmaliciousPhisherBrowse
                                        • 104.17.25.14
                                        Invoice for 04-09-24 fede39.admr.org.htmlGet hashmaliciousUnknownBrowse
                                        • 104.22.21.144
                                        http://elink.adityabirlacapital.net.in/vtrack?clientid=180050&ul=V1dUDgFVUQBEBUsHC1AWVRYJQFoHSh0JAFRVJlNNRFxYAExcCl5YX0pDX1ZBAxkGDA9JCwEADgcOAgRQBQFRGA==&ml=UFVTCAJUGQJEBARQVE0=&sl=JB8gRHsrGWF1YUsAD1gKX0wDUV4SQVIHDENVB1FZQFpBAFQbC1VNH1paSwM=&pp=0&ga=utm_source*3DLaunch_Email*26utm_campaign*3DCredit_Card_Open_market_launch_mailer*26utm_medium*3DEmailer*26utm_content*3D&fl=DhcXSEFfSh1XW1IEE0FKVQAEWVMPSlYGER9aCV8XUUZWAhdZCldQXw==&ext=ZHNhX2hhc2g9NmNkNDQ0NzUzYzFjNDUxYjhmMTk3MGQ0ZWY4ODMzNTliMWY1ZGZlMGFiNmJhZGIzNTJmNjkwZmRiZGFhNmU4NA==__;JSUlJSUlJQ!!BHlfX_zbyOAjqHI!03-Fsf1m9LHxf3kl5f_PKtZdC3BdSLEHLybwWH9XZB3yWW9-I2XfZKwh0BYYAkvEXzZMML5XJpRzc_HszKOioGrAKwTWEEqGUdfAguyCT0oq$Get hashmaliciousUnknownBrowse
                                        • 104.17.25.14
                                        _PDF__838754.msiGet hashmaliciousMetamorfoBrowse
                                        • 104.20.3.235
                                        file.exeGet hashmaliciousUnknownBrowse
                                        • 172.64.41.3
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0euxMCGUELJd.exeGet hashmaliciousZorabBrowse
                                        • 172.67.74.152
                                        PRODUCT LIST.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 172.67.74.152
                                        QUOTATION_SEPQTRA071244#U00faPDF.scrGet hashmaliciousFormBookBrowse
                                        • 172.67.74.152
                                        Payment Confirmation Documents.vbeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        http://clicktogo.click/downloads/tra5Get hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        http://link.dpd.pt/l/YCaldMErXuGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        po89654.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        VDF645425140#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                        • 172.67.74.152
                                        bot_library.exeGet hashmaliciousUnknownBrowse
                                        • 172.67.74.152
                                        No context
                                        Process:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Users\user\Desktop\z17invoice.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):2232
                                        Entropy (8bit):5.380192968514367
                                        Encrypted:false
                                        SSDEEP:48:+WSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//8PUyus:+LHyIFKL3IZ2KRH9Oug8s
                                        MD5:2E16D2F2BF61526793175AF057C80E38
                                        SHA1:C646E8FE846DE9B54BF04679A5A9F5216DD5C7B9
                                        SHA-256:BA86B69C37F37E218D33B2643466FD3C5D2551C0215ABC36883C7A2D75C9848C
                                        SHA-512:3E95DF7756044BB4CAFE391CB8860B551621923B795B80FE6753DD5B1D11B9DCB5F41938B65761D6D7EE5689471A0AA7CE3EAF38A03A50399FA29704294AD34E
                                        Malicious:false
                                        Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Users\user\Desktop\z17invoice.exe
                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):688128
                                        Entropy (8bit):7.724794079243151
                                        Encrypted:false
                                        SSDEEP:12288:vvBKYvI8cu/ZRrJt6cGMJIfAXL2RR3IKE0M8wkFoJJprYuBC5o:3OqLrJt3lJbC/3IKUOoJJpfg5
                                        MD5:C418187A5268D408094B89AA79E3A5A2
                                        SHA1:A5A24C8AEEF29107CB3A72ACBE45D77274EE3CF9
                                        SHA-256:66F51EE1DEB34F149491E55735E671876E22FE37F749FDFA30238041A35BAFC6
                                        SHA-512:81CD5895C5854F7E58B0FBED8F77E93A7A5C89E2A32B9921061E6235CBD4C16A0C7ECD80C83D52B4E388F9C78C8198041BDF36DFE3AFA217F3F2AAEFEF43E822
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                        • Antivirus: ReversingLabs, Detection: 66%
                                        • Antivirus: Virustotal, Detection: 61%, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...B..f..............0..P... ......Ve... ........@.. ....................................@..................................e..O....................................T..T............................................ ............... ..H............text...\E... ...P.................. ..`.rsrc................`..............@..@.reloc...............p..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\user\Desktop\z17invoice.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:modified
                                        Size (bytes):26
                                        Entropy (8bit):3.95006375643621
                                        Encrypted:false
                                        SSDEEP:3:ggPYV:rPYV
                                        MD5:187F488E27DB4AF347237FE461A079AD
                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                        Malicious:true
                                        Preview:[ZoneTransfer]....ZoneId=0
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.724794079243151
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        File name:z17invoice.exe
                                        File size:688'128 bytes
                                        MD5:c418187a5268d408094b89aa79e3a5a2
                                        SHA1:a5a24c8aeef29107cb3a72acbe45d77274ee3cf9
                                        SHA256:66f51ee1deb34f149491e55735e671876e22fe37f749fdfa30238041a35bafc6
                                        SHA512:81cd5895c5854f7e58b0fbed8f77e93a7a5c89e2a32b9921061e6235cbd4c16a0c7ecd80c83d52b4e388f9c78c8198041bdf36dfe3afa217f3f2aaefef43e822
                                        SSDEEP:12288:vvBKYvI8cu/ZRrJt6cGMJIfAXL2RR3IKE0M8wkFoJJprYuBC5o:3OqLrJt3lJbC/3IKUOoJJpfg5
                                        TLSH:B9E402682A4AE503C65147794FB2F2B9263C5DEDB811D3639FEDAEEFF926C044D04281
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...B..f..............0..P... ......Ve... ........@.. ....................................@................................
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x4a6556
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66D59142 [Mon Sep 2 10:19:46 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xa65010x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x5d8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xa54c40x54.text
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000xa455c0xa5000ba66143d43ee8901fdaa67f0f93e196aFalse0.9304672703598484data7.782349079077635IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0xa80000x5d80x1000fd70716b65f882ed142c022aa3faa614False0.164306640625data1.965556668388912IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0xaa0000xc0x10004cf05fd319e5bfb5f3e7b9ab2caaf3c8False0.009033203125data0.016408464515625623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_VERSION0xa80900x346data0.42482100238663484
                                        RT_MANIFEST0xa83e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSource PortDest PortSource IPDest IP
                                        Sep 4, 2024 13:01:02.449305058 CEST49706443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:02.449390888 CEST44349706172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:02.449470997 CEST49706443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:02.453792095 CEST49706443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:02.453839064 CEST44349706172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:02.915483952 CEST44349706172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:02.915559053 CEST49706443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:02.923877001 CEST49706443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:02.923897028 CEST44349706172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:02.924185991 CEST44349706172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:02.977638006 CEST49706443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:03.062041998 CEST49706443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:03.108504057 CEST44349706172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:03.188206911 CEST44349706172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:03.188277006 CEST44349706172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:03.188330889 CEST49706443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:03.200090885 CEST49706443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:03.885452986 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:03.890265942 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:03.890408039 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:04.705415964 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:04.709815979 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:04.714804888 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:04.870009899 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:04.873251915 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:04.878282070 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.101020098 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.102642059 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:05.107441902 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.262693882 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.262711048 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.262722969 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.262737036 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.262773037 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:05.262804985 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:05.355144024 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.392333031 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:05.397280931 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.553157091 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.557431936 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:05.562350988 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.999346972 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.999670029 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:05.999731064 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.000508070 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.005501986 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.163350105 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.165088892 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.171080112 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.331258059 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.331554890 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.336436987 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.493940115 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.494348049 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.500504017 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.684855938 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.685105085 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.690006971 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.846132994 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.846786976 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.846868038 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.846893072 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.846918106 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:06.851846933 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.851893902 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.851903915 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:06.851916075 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:07.230400085 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:07.273451090 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:14.969706059 CEST49711443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:14.969758034 CEST44349711172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:14.969834089 CEST49711443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:14.974092007 CEST49711443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:14.974107027 CEST44349711172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:15.461869001 CEST44349711172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:15.461956978 CEST49711443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:15.464777946 CEST49711443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:15.464790106 CEST44349711172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:15.465063095 CEST44349711172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:15.507843018 CEST49711443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:15.867101908 CEST49711443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:15.912513971 CEST44349711172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:15.984430075 CEST44349711172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:15.984509945 CEST44349711172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:15.984575033 CEST49711443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:15.987541914 CEST49711443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:16.463738918 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:16.470772028 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:16.470853090 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:17.041685104 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.042040110 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:17.047007084 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.207070112 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.207653999 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:17.212526083 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.365940094 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.366447926 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:17.371309996 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.524765968 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.524785995 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.524796963 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.524802923 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.524888039 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:17.614980936 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.616796970 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:17.621646881 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.778609991 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.784312010 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:17.789155960 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.942346096 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:17.943403006 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:17.949112892 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.105381012 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.105734110 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:18.111085892 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.269253969 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.269546986 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:18.274435043 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.429495096 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.430489063 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:18.435305119 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.615150928 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.615389109 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:18.620199919 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.774732113 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.775521994 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:18.775582075 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:18.775608063 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:18.775623083 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:18.780911922 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.780951023 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:18.780992985 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:19.446417093 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:19.446888924 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:19.446968079 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:23.696661949 CEST49720443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:23.696705103 CEST44349720172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:23.696799040 CEST49720443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:23.699881077 CEST49720443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:23.699898958 CEST44349720172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:24.169136047 CEST44349720172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:24.169215918 CEST49720443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:24.174036026 CEST49720443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:24.174046993 CEST44349720172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:24.174283028 CEST44349720172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:24.226583004 CEST49720443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:24.237968922 CEST49720443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:24.284492016 CEST44349720172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:24.350796938 CEST44349720172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:24.350857973 CEST44349720172.67.74.152192.168.2.5
                                        Sep 4, 2024 13:01:24.350970984 CEST49720443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:24.353688955 CEST49720443192.168.2.5172.67.74.152
                                        Sep 4, 2024 13:01:24.844070911 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:24.848958969 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:24.849076986 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:25.429033041 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.429244041 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:25.434931993 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.588136911 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.600202084 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:25.605156898 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.760747910 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.762156010 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:25.767033100 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.920514107 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.920531034 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.920542955 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.920588017 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:25.920598984 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:25.920627117 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:26.011149883 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.014522076 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:26.019391060 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.172900915 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.178714991 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:26.183499098 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.336738110 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.337084055 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:26.341897011 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.497797012 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.498157978 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:26.503031015 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.661727905 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.662071943 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:26.666827917 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.823132992 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:26.823395967 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:26.828284979 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:27.008934975 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:27.009561062 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:27.014341116 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:27.169615030 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:27.170461893 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:27.170572042 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:27.170593977 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:27.170620918 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:27.175638914 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:27.175652981 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:27.175661087 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:27.175674915 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:27.565984964 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:27.617245913 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:28.649229050 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:28.649363995 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:28.649702072 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:28.649858952 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:01:28.650144100 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:01:28.650191069 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:02:43.898881912 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:02:43.908960104 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:02:44.064609051 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:02:44.065393925 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:02:44.065677881 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:02:44.065689087 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:02:44.065741062 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:02:44.065758944 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:02:44.070509911 CEST58749708208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:02:44.070558071 CEST49708587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:02:56.492770910 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:02:56.497579098 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:02:56.650942087 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:02:56.651382923 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:02:56.651428938 CEST58749712208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:02:56.651439905 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:02:56.651480913 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:02:56.651480913 CEST49712587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:03:04.867424965 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:03:04.872298956 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:03:05.029479027 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:03:05.030008078 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:03:05.030483961 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:03:05.030546904 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:03:05.030587912 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:03:05.030627966 CEST49721587192.168.2.5208.91.198.143
                                        Sep 4, 2024 13:03:05.034869909 CEST58749721208.91.198.143192.168.2.5
                                        Sep 4, 2024 13:03:05.034909964 CEST49721587192.168.2.5208.91.198.143
                                        TimestampSource PortDest PortSource IPDest IP
                                        Sep 4, 2024 13:01:02.432848930 CEST6428753192.168.2.51.1.1.1
                                        Sep 4, 2024 13:01:02.439883947 CEST53642871.1.1.1192.168.2.5
                                        Sep 4, 2024 13:01:03.874705076 CEST5098053192.168.2.51.1.1.1
                                        Sep 4, 2024 13:01:03.884618044 CEST53509801.1.1.1192.168.2.5
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Sep 4, 2024 13:01:02.432848930 CEST192.168.2.51.1.1.10x8146Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                        Sep 4, 2024 13:01:03.874705076 CEST192.168.2.51.1.1.10x9877Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Sep 4, 2024 13:01:02.439883947 CEST1.1.1.1192.168.2.50x8146No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                        Sep 4, 2024 13:01:02.439883947 CEST1.1.1.1192.168.2.50x8146No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                        Sep 4, 2024 13:01:02.439883947 CEST1.1.1.1192.168.2.50x8146No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                        Sep 4, 2024 13:01:03.884618044 CEST1.1.1.1192.168.2.50x9877No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                                        Sep 4, 2024 13:01:03.884618044 CEST1.1.1.1192.168.2.50x9877No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                                        Sep 4, 2024 13:01:03.884618044 CEST1.1.1.1192.168.2.50x9877No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                                        Sep 4, 2024 13:01:03.884618044 CEST1.1.1.1192.168.2.50x9877No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                                        • api.ipify.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.549706172.67.74.1524435752C:\Users\user\Desktop\z17invoice.exe
                                        TimestampBytes transferredDirectionData
                                        2024-09-04 11:01:03 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-09-04 11:01:03 UTC211INHTTP/1.1 200 OK
                                        Date: Wed, 04 Sep 2024 11:01:03 GMT
                                        Content-Type: text/plain
                                        Content-Length: 11
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8bdd7ab67b2c4392-EWR
                                        2024-09-04 11:01:03 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                        Data Ascii: 8.46.123.33


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.549711172.67.74.1524431864C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        TimestampBytes transferredDirectionData
                                        2024-09-04 11:01:15 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-09-04 11:01:15 UTC211INHTTP/1.1 200 OK
                                        Date: Wed, 04 Sep 2024 11:01:15 GMT
                                        Content-Type: text/plain
                                        Content-Length: 11
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8bdd7b0679e9c411-EWR
                                        2024-09-04 11:01:15 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                        Data Ascii: 8.46.123.33


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.549720172.67.74.1524434120C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        TimestampBytes transferredDirectionData
                                        2024-09-04 11:01:24 UTC155OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                        Host: api.ipify.org
                                        Connection: Keep-Alive
                                        2024-09-04 11:01:24 UTC211INHTTP/1.1 200 OK
                                        Date: Wed, 04 Sep 2024 11:01:24 GMT
                                        Content-Type: text/plain
                                        Content-Length: 11
                                        Connection: close
                                        Vary: Origin
                                        CF-Cache-Status: DYNAMIC
                                        Server: cloudflare
                                        CF-RAY: 8bdd7b3aca2c0f99-EWR
                                        2024-09-04 11:01:24 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                        Data Ascii: 8.46.123.33


                                        TimestampSource PortDest PortSource IPDest IPCommands
                                        Sep 4, 2024 13:01:04.705415964 CEST58749708208.91.198.143192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                        Sep 4, 2024 13:01:04.709815979 CEST49708587192.168.2.5208.91.198.143EHLO 841618
                                        Sep 4, 2024 13:01:04.870009899 CEST58749708208.91.198.143192.168.2.5250-us2.outbound.mailhostbox.com
                                        250-PIPELINING
                                        250-SIZE 41648128
                                        250-VRFY
                                        250-ETRN
                                        250-STARTTLS
                                        250-AUTH PLAIN LOGIN
                                        250-AUTH=PLAIN LOGIN
                                        250-ENHANCEDSTATUSCODES
                                        250-8BITMIME
                                        250-DSN
                                        250 CHUNKING
                                        Sep 4, 2024 13:01:04.873251915 CEST49708587192.168.2.5208.91.198.143STARTTLS
                                        Sep 4, 2024 13:01:05.101020098 CEST58749708208.91.198.143192.168.2.5220 2.0.0 Ready to start TLS
                                        Sep 4, 2024 13:01:17.041685104 CEST58749712208.91.198.143192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                        Sep 4, 2024 13:01:17.042040110 CEST49712587192.168.2.5208.91.198.143EHLO 841618
                                        Sep 4, 2024 13:01:17.207070112 CEST58749712208.91.198.143192.168.2.5250-us2.outbound.mailhostbox.com
                                        250-PIPELINING
                                        250-SIZE 41648128
                                        250-VRFY
                                        250-ETRN
                                        250-STARTTLS
                                        250-AUTH PLAIN LOGIN
                                        250-AUTH=PLAIN LOGIN
                                        250-ENHANCEDSTATUSCODES
                                        250-8BITMIME
                                        250-DSN
                                        250 CHUNKING
                                        Sep 4, 2024 13:01:17.207653999 CEST49712587192.168.2.5208.91.198.143STARTTLS
                                        Sep 4, 2024 13:01:17.365940094 CEST58749712208.91.198.143192.168.2.5220 2.0.0 Ready to start TLS
                                        Sep 4, 2024 13:01:25.429033041 CEST58749721208.91.198.143192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                                        Sep 4, 2024 13:01:25.429244041 CEST49721587192.168.2.5208.91.198.143EHLO 841618
                                        Sep 4, 2024 13:01:25.588136911 CEST58749721208.91.198.143192.168.2.5250-us2.outbound.mailhostbox.com
                                        250-PIPELINING
                                        250-SIZE 41648128
                                        250-VRFY
                                        250-ETRN
                                        250-STARTTLS
                                        250-AUTH PLAIN LOGIN
                                        250-AUTH=PLAIN LOGIN
                                        250-ENHANCEDSTATUSCODES
                                        250-8BITMIME
                                        250-DSN
                                        250 CHUNKING
                                        Sep 4, 2024 13:01:25.600202084 CEST49721587192.168.2.5208.91.198.143STARTTLS
                                        Sep 4, 2024 13:01:25.760747910 CEST58749721208.91.198.143192.168.2.5220 2.0.0 Ready to start TLS

                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:07:00:58
                                        Start date:04/09/2024
                                        Path:C:\Users\user\Desktop\z17invoice.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\z17invoice.exe"
                                        Imagebase:0x260000
                                        File size:688'128 bytes
                                        MD5 hash:C418187A5268D408094B89AA79E3A5A2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2049081796.00000000036F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:3
                                        Start time:07:00:59
                                        Start date:04/09/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\z17invoice.exe"
                                        Imagebase:0xb40000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:07:00:59
                                        Start date:04/09/2024
                                        Path:C:\Users\user\Desktop\z17invoice.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\z17invoice.exe"
                                        Imagebase:0xfa0000
                                        File size:688'128 bytes
                                        MD5 hash:C418187A5268D408094B89AA79E3A5A2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3283273481.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3283273481.00000000033D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3283273481.0000000003404000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3283273481.00000000033FC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:5
                                        Start time:07:00:59
                                        Start date:04/09/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff6d64d0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:07:01:02
                                        Start date:04/09/2024
                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                        Imagebase:0x7ff6ef0c0000
                                        File size:496'640 bytes
                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                        Has elevated privileges:true
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:7
                                        Start time:07:01:12
                                        Start date:04/09/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0x2c0000
                                        File size:688'128 bytes
                                        MD5 hash:C418187A5268D408094B89AA79E3A5A2
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2187583552.000000000377B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2187583552.000000000377B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2187583552.0000000003702000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2187583552.0000000003702000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Antivirus matches:
                                        • Detection: 100%, Joe Sandbox ML
                                        • Detection: 66%, ReversingLabs
                                        • Detection: 61%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:true

                                        Target ID:8
                                        Start time:07:01:13
                                        Start date:04/09/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0xd90000
                                        File size:688'128 bytes
                                        MD5 hash:C418187A5268D408094B89AA79E3A5A2
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.3281780432.000000000312C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.3281780432.0000000003134000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3281780432.0000000003101000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.3281780432.0000000003101000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.3278015316.0000000000429000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Target ID:10
                                        Start time:07:01:20
                                        Start date:04/09/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0x220000
                                        File size:688'128 bytes
                                        MD5 hash:C418187A5268D408094B89AA79E3A5A2
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.2281400349.0000000003730000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.2281400349.0000000003730000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:11
                                        Start time:07:01:22
                                        Start date:04/09/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0x10000
                                        File size:688'128 bytes
                                        MD5 hash:C418187A5268D408094B89AA79E3A5A2
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:12
                                        Start time:07:01:22
                                        Start date:04/09/2024
                                        Path:C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\AppData\Roaming\mpTrle\mpTrle.exe"
                                        Imagebase:0xf10000
                                        File size:688'128 bytes
                                        MD5 hash:C418187A5268D408094B89AA79E3A5A2
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.3282236236.000000000339C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.3282236236.00000000033A4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.3282236236.0000000003371000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.3282236236.0000000003371000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:8%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:93
                                          Total number of Limit Nodes:4
                                          execution_graph 29701 b880ee8 29702 b880f0e 29701->29702 29703 b881073 29701->29703 29702->29703 29706 b881168 PostMessageW 29702->29706 29708 b881160 PostMessageW 29702->29708 29707 b8811d4 29706->29707 29707->29702 29709 b8811d4 29708->29709 29709->29702 29710 bdd01c 29711 bdd034 29710->29711 29712 bdd08e 29711->29712 29715 4b92818 29711->29715 29720 4b92808 29711->29720 29716 4b92845 29715->29716 29717 4b92877 29716->29717 29725 4b92991 29716->29725 29730 4b929a0 29716->29730 29721 4b92818 29720->29721 29722 4b92877 29721->29722 29723 4b92991 2 API calls 29721->29723 29724 4b929a0 2 API calls 29721->29724 29723->29722 29724->29722 29727 4b929b4 29725->29727 29726 4b92a40 29726->29717 29735 4b92a58 29727->29735 29738 4b92a48 29727->29738 29732 4b929b4 29730->29732 29731 4b92a40 29731->29717 29733 4b92a58 2 API calls 29732->29733 29734 4b92a48 2 API calls 29732->29734 29733->29731 29734->29731 29737 4b92a69 29735->29737 29741 4b94012 29735->29741 29737->29726 29739 4b92a69 29738->29739 29740 4b94012 2 API calls 29738->29740 29739->29726 29740->29739 29745 4b94040 29741->29745 29749 4b94030 29741->29749 29742 4b9402a 29742->29737 29746 4b94082 29745->29746 29748 4b94089 29745->29748 29747 4b940da CallWindowProcW 29746->29747 29746->29748 29747->29748 29748->29742 29750 4b94040 29749->29750 29751 4b940da CallWindowProcW 29750->29751 29752 4b94089 29750->29752 29751->29752 29752->29742 29669 263acb0 29670 263acbf 29669->29670 29673 263ad97 29669->29673 29681 263ada8 29669->29681 29674 263adb9 29673->29674 29675 263addc 29673->29675 29674->29675 29689 263b040 29674->29689 29693 263b031 29674->29693 29675->29670 29676 263add4 29676->29675 29677 263afe0 GetModuleHandleW 29676->29677 29678 263b00d 29677->29678 29678->29670 29682 263adb9 29681->29682 29683 263addc 29681->29683 29682->29683 29687 263b031 LoadLibraryExW 29682->29687 29688 263b040 LoadLibraryExW 29682->29688 29683->29670 29684 263add4 29684->29683 29685 263afe0 GetModuleHandleW 29684->29685 29686 263b00d 29685->29686 29686->29670 29687->29684 29688->29684 29690 263b054 29689->29690 29691 263b079 29690->29691 29697 263a130 29690->29697 29691->29676 29694 263b054 29693->29694 29695 263b079 29694->29695 29696 263a130 LoadLibraryExW 29694->29696 29695->29676 29696->29695 29698 263b220 LoadLibraryExW 29697->29698 29700 263b299 29698->29700 29700->29691 29753 263d040 29754 263d086 29753->29754 29758 263d628 29754->29758 29761 263d618 29754->29761 29755 263d173 29765 263d27c 29758->29765 29762 263d628 29761->29762 29763 263d27c DuplicateHandle 29762->29763 29764 263d656 29763->29764 29764->29755 29766 263d690 DuplicateHandle 29765->29766 29767 263d656 29766->29767 29767->29755 29648 2634668 29649 263467f 29648->29649 29650 263468b 29649->29650 29652 2634781 29649->29652 29653 26347a5 29652->29653 29657 2634881 29653->29657 29661 2634890 29653->29661 29659 26348b7 29657->29659 29658 2634994 29658->29658 29659->29658 29665 26344c4 29659->29665 29663 26348b7 29661->29663 29662 2634994 29662->29662 29663->29662 29664 26344c4 CreateActCtxA 29663->29664 29664->29662 29666 2635920 CreateActCtxA 29665->29666 29668 26359e3 29666->29668
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2058936624.000000000B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b880000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dd50ec31963cb128999988c2ead6b44e9f101c97b60047fa3f5a43ee27bd62d3
                                          • Instruction ID: c5fdbd9f1b7a22b28e9cd50cccc922ca3a6cdcf8e582350fa5346e27a64fea8b
                                          • Opcode Fuzzy Hash: dd50ec31963cb128999988c2ead6b44e9f101c97b60047fa3f5a43ee27bd62d3
                                          • Instruction Fuzzy Hash: 77E08C75D4910CCFDB00EF40E4000F8F7B8E74EB19F0020A2D51DE7221C3305A99CA18
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2058936624.000000000B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b880000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 355a3b0362be2f51a37b017f0a11c2d7ae1fac45d81b6d51333d021e30ebfe23
                                          • Instruction ID: 1e35d609668b66e0de10413b8b40091a13ce842fe0cb61987244a70da9b36e2b
                                          • Opcode Fuzzy Hash: 355a3b0362be2f51a37b017f0a11c2d7ae1fac45d81b6d51333d021e30ebfe23
                                          • Instruction Fuzzy Hash: 4BB09226ECE40CD389002C8474000F9E73ED28BA2EE153063C22EE71328110822E41AD

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 425 263ada8-263adb7 426 263ade3-263ade7 425->426 427 263adb9-263adc6 call 263a0cc 425->427 429 263adfb-263ae3c 426->429 430 263ade9-263adf3 426->430 433 263adc8 427->433 434 263addc 427->434 436 263ae49-263ae57 429->436 437 263ae3e-263ae46 429->437 430->429 482 263adce call 263b031 433->482 483 263adce call 263b040 433->483 434->426 438 263ae7b-263ae7d 436->438 439 263ae59-263ae5e 436->439 437->436 444 263ae80-263ae87 438->444 441 263ae60-263ae67 call 263a0d8 439->441 442 263ae69 439->442 440 263add4-263add6 440->434 443 263af18-263afd8 440->443 446 263ae6b-263ae79 441->446 442->446 477 263afe0-263b00b GetModuleHandleW 443->477 478 263afda-263afdd 443->478 447 263ae94-263ae9b 444->447 448 263ae89-263ae91 444->448 446->444 451 263aea8-263aeaa call 263a0e8 447->451 452 263ae9d-263aea5 447->452 448->447 454 263aeaf-263aeb1 451->454 452->451 456 263aeb3-263aebb 454->456 457 263aebe-263aec3 454->457 456->457 458 263aee1-263aeee 457->458 459 263aec5-263aecc 457->459 466 263af11-263af17 458->466 467 263aef0-263af0e 458->467 459->458 461 263aece-263aede call 263a0f8 call 263a108 459->461 461->458 467->466 479 263b014-263b028 477->479 480 263b00d-263b013 477->480 478->477 480->479 482->440 483->440
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0263AFFE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2048423460.0000000002630000.00000040.00000800.00020000.00000000.sdmp, Offset: 02630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2630000_z17invoice.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 93116a969f928107ad8edc4ff5a8a75f1afe08feea017e25a68f586921654a64
                                          • Instruction ID: 3bafca473130823cb4681a4061ccb5a393ce791c9013da74c9b1ac2585e45de3
                                          • Opcode Fuzzy Hash: 93116a969f928107ad8edc4ff5a8a75f1afe08feea017e25a68f586921654a64
                                          • Instruction Fuzzy Hash: 4A813270A00B458FD725DFA9D4447AABBF1FF88708F00892ED08A97B50D775E84ADB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 484 2635914-263591e 485 2635920-26359e1 CreateActCtxA 484->485 487 26359e3-26359e9 485->487 488 26359ea-2635a44 485->488 487->488 495 2635a53-2635a57 488->495 496 2635a46-2635a49 488->496 497 2635a59-2635a65 495->497 498 2635a68 495->498 496->495 497->498 500 2635a69 498->500 500->500
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 026359D1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2048423460.0000000002630000.00000040.00000800.00020000.00000000.sdmp, Offset: 02630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2630000_z17invoice.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 620417714eab17398327fcf90776f39810c5c3df1904247f5439219cb41b791c
                                          • Instruction ID: 67191faf4b5ac32015ff84b98d70c70742ae07e2424572ab9fba78f6c59b646b
                                          • Opcode Fuzzy Hash: 620417714eab17398327fcf90776f39810c5c3df1904247f5439219cb41b791c
                                          • Instruction Fuzzy Hash: 4B4102B0C00719CBDB25DFA9C844BCEBBF5BF48304F60806AD409AB264DB75694ACF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 501 26344c4-26359e1 CreateActCtxA 504 26359e3-26359e9 501->504 505 26359ea-2635a44 501->505 504->505 512 2635a53-2635a57 505->512 513 2635a46-2635a49 505->513 514 2635a59-2635a65 512->514 515 2635a68 512->515 513->512 514->515 517 2635a69 515->517 517->517
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 026359D1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2048423460.0000000002630000.00000040.00000800.00020000.00000000.sdmp, Offset: 02630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2630000_z17invoice.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: b8fa39ad175d8a681706f3f9e3fcf3f42e4e017d3390ceb657d9fd82c639cd6b
                                          • Instruction ID: 4727e74c65c682c63632f3f75cc5683872b72d3c54a087068ebf5e52df8fc9b7
                                          • Opcode Fuzzy Hash: b8fa39ad175d8a681706f3f9e3fcf3f42e4e017d3390ceb657d9fd82c639cd6b
                                          • Instruction Fuzzy Hash: CC41EFB0C00719CBDB25DFA9C844B9EBBB5FF48304F60806AD409AB260DB75694ACF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 518 4b94040-4b9407c 519 4b9412c-4b9414c 518->519 520 4b94082-4b94087 518->520 526 4b9414f-4b9415c 519->526 521 4b94089-4b940c0 520->521 522 4b940da-4b94112 CallWindowProcW 520->522 528 4b940c9-4b940d8 521->528 529 4b940c2-4b940c8 521->529 523 4b9411b-4b9412a 522->523 524 4b94114-4b9411a 522->524 523->526 524->523 528->526 529->528
                                          APIs
                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 04B94101
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2053920309.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_z17invoice.jbxd
                                          Similarity
                                          • API ID: CallProcWindow
                                          • String ID:
                                          • API String ID: 2714655100-0
                                          • Opcode ID: e41cc556b8e3f60ffecdbba5ff769d96177789c00edd1b69a9e5d1584eef4b68
                                          • Instruction ID: 662d14bca15844eac9fa475188ee089b50bb236a44d027e987f70b303ddc7f99
                                          • Opcode Fuzzy Hash: e41cc556b8e3f60ffecdbba5ff769d96177789c00edd1b69a9e5d1584eef4b68
                                          • Instruction Fuzzy Hash: 654115B5A003199FDB14CF99C848AAABBF5FF89314F24C499D519AB321D375A841CFA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 532 263d27c-263d724 DuplicateHandle 534 263d726-263d72c 532->534 535 263d72d-263d74a 532->535 534->535
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0263D656,?,?,?,?,?), ref: 0263D717
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2048423460.0000000002630000.00000040.00000800.00020000.00000000.sdmp, Offset: 02630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2630000_z17invoice.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 2d571f19ce879bea5b7f174293615c9b570024e013320c9ac7ed38fe4dd0b0fc
                                          • Instruction ID: 9269cd86c85aea92c74bf16f50813b749e16ca9ec9f9d51fff0daed1bcdd36dd
                                          • Opcode Fuzzy Hash: 2d571f19ce879bea5b7f174293615c9b570024e013320c9ac7ed38fe4dd0b0fc
                                          • Instruction Fuzzy Hash: 7621E4B59003489FDB10CF9AD584AEEBBF9FB48314F14845AE918A3350D378A950CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 538 263d689-263d68e 539 263d690-263d724 DuplicateHandle 538->539 540 263d726-263d72c 539->540 541 263d72d-263d74a 539->541 540->541
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0263D656,?,?,?,?,?), ref: 0263D717
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2048423460.0000000002630000.00000040.00000800.00020000.00000000.sdmp, Offset: 02630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2630000_z17invoice.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 83b7d69b06b83164b207910cde306de44dc32de35e8dce0f32436de859bb72be
                                          • Instruction ID: 52c14506d776d89ee855e60675aea99e8a6449b25def0ace4bf38acf12e90c9f
                                          • Opcode Fuzzy Hash: 83b7d69b06b83164b207910cde306de44dc32de35e8dce0f32436de859bb72be
                                          • Instruction Fuzzy Hash: 0721E4B59003489FDB10CF9AD584ADEBBF9FB48314F14841AE918A3350C378A940CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 544 263a130-263b260 546 263b262-263b265 544->546 547 263b268-263b297 LoadLibraryExW 544->547 546->547 548 263b2a0-263b2bd 547->548 549 263b299-263b29f 547->549 549->548
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0263B079,00000800,00000000,00000000), ref: 0263B28A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2048423460.0000000002630000.00000040.00000800.00020000.00000000.sdmp, Offset: 02630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2630000_z17invoice.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 30cf0f680fa467580ee75f9d11345759befdff5009e74bf59506c3d485f476a3
                                          • Instruction ID: 2e73cf5b656584bbe340f5001d619091ccf08d2fe5359ac7ae8eca4ec56f0fca
                                          • Opcode Fuzzy Hash: 30cf0f680fa467580ee75f9d11345759befdff5009e74bf59506c3d485f476a3
                                          • Instruction Fuzzy Hash: 031103B69003099FDB10DF9AC484AAEFBF5FB48314F10852AD519A7210C379A545CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 552 263b219-263b260 553 263b262-263b265 552->553 554 263b268-263b297 LoadLibraryExW 552->554 553->554 555 263b2a0-263b2bd 554->555 556 263b299-263b29f 554->556 556->555
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0263B079,00000800,00000000,00000000), ref: 0263B28A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2048423460.0000000002630000.00000040.00000800.00020000.00000000.sdmp, Offset: 02630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2630000_z17invoice.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 0aa7ac29356c3b8b6e90782c33d8fe9787cfc59db136271111fd357fb013a42b
                                          • Instruction ID: 1934c214338ab3af28107317d2a6e09fe2f3dd84ac33e3f59f007a4562872ad5
                                          • Opcode Fuzzy Hash: 0aa7ac29356c3b8b6e90782c33d8fe9787cfc59db136271111fd357fb013a42b
                                          • Instruction Fuzzy Hash: B11112B69003498FDB10DF9AC584AEEFBF4BB48314F14856AD819A7310C379A545CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 559 b881160-b8811d2 PostMessageW 560 b8811db-b8811ef 559->560 561 b8811d4-b8811da 559->561 561->560
                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 0B8811C5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2058936624.000000000B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b880000_z17invoice.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: d8c570e3619ed2ec61ef7880bcbe3f5ec940f4869a29d202d8383f42537344dd
                                          • Instruction ID: fa4904523f2206c9df3cfe67dc0a7a741bd2f3264cc48ecc134383dbdae26301
                                          • Opcode Fuzzy Hash: d8c570e3619ed2ec61ef7880bcbe3f5ec940f4869a29d202d8383f42537344dd
                                          • Instruction Fuzzy Hash: EF1136B58003489FCB10EF99D888BDEBFF8EB48310F108409D518A3610C379A545CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 563 263af98-263afd8 564 263afe0-263b00b GetModuleHandleW 563->564 565 263afda-263afdd 563->565 566 263b014-263b028 564->566 567 263b00d-263b013 564->567 565->564 567->566
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0263AFFE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2048423460.0000000002630000.00000040.00000800.00020000.00000000.sdmp, Offset: 02630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2630000_z17invoice.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 09454e2cd2590e258f2ec4fb5ba4dbf0aa20c6c16417a180d59f8fb445b6a191
                                          • Instruction ID: f4a5d42fb30d69e46495a28d5094e1e4d7ab7073610ea2253d691e39fb89ebd9
                                          • Opcode Fuzzy Hash: 09454e2cd2590e258f2ec4fb5ba4dbf0aa20c6c16417a180d59f8fb445b6a191
                                          • Instruction Fuzzy Hash: 6E11DFB6C007498FCB10DF9AC544A9EFBF5AB88318F14845AD529A7210D379A545CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 569 b881168-b8811d2 PostMessageW 570 b8811db-b8811ef 569->570 571 b8811d4-b8811da 569->571 571->570
                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 0B8811C5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2058936624.000000000B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b880000_z17invoice.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 33cfaca6474e892170bd7b3a169731701c736d2c7d60b2da20c9bb8fc55e2fd3
                                          • Instruction ID: a39d83d4fc9a417d9aa617f4a2eb891c0aa13c7d3c6777725d22e9f20692f2d7
                                          • Opcode Fuzzy Hash: 33cfaca6474e892170bd7b3a169731701c736d2c7d60b2da20c9bb8fc55e2fd3
                                          • Instruction Fuzzy Hash: 2311D3B58003499FDB10DF9AD849BDEBBF8EB49310F108459D518A7650C379A944CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2047803960.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_bcd000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 32940edb165f93e9ba834a6ccc2ccec40d37639ae28f7fcabb664d410463f5ac
                                          • Instruction ID: 289593aad8b5509d39a991092ecac15dcbb3502d5ec52d63201a31a61f5f9a46
                                          • Opcode Fuzzy Hash: 32940edb165f93e9ba834a6ccc2ccec40d37639ae28f7fcabb664d410463f5ac
                                          • Instruction Fuzzy Hash: B721E279500204DFDB09DF14D9C0F26BFA5FB98314F20C5BDDA094A356C33AE856D6A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2047866449.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_bdd000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a35d0dd9c58e9cd3483473355e019b107697d9d3204e6a299940ad1dee0b0735
                                          • Instruction ID: 5f80942277ab22a1f92c84248a37dc78a3c41e93c11d253de46fd335a1d16017
                                          • Opcode Fuzzy Hash: a35d0dd9c58e9cd3483473355e019b107697d9d3204e6a299940ad1dee0b0735
                                          • Instruction Fuzzy Hash: F521D075604204DFCB14DF24D9D4B26FBA5EB88314F24C5AAD98A4B396D33AD806CAA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2047866449.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_bdd000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d85c85e61bea8837c7cb383a964477d0ea89d72fd8db7893f995d0f400d3a6aa
                                          • Instruction ID: 8d76053d66dbfdc95ab9bac49d1964a19456aaefb87836daf7f0a1310e0a38da
                                          • Opcode Fuzzy Hash: d85c85e61bea8837c7cb383a964477d0ea89d72fd8db7893f995d0f400d3a6aa
                                          • Instruction Fuzzy Hash: F121F271644204EFDB05DF64D9C0F26FBA5FB88314F20C5AEE9894B396D33AD806CA61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2047866449.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_bdd000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 873562e31c2691b2300e8d77cb04283a1e40d1765e2069ce503dcb35544c0fba
                                          • Instruction ID: 7214868f65f6704246760ec64be48bec322cb585042679d934a83100a7006d89
                                          • Opcode Fuzzy Hash: 873562e31c2691b2300e8d77cb04283a1e40d1765e2069ce503dcb35544c0fba
                                          • Instruction Fuzzy Hash: B52195755093808FCB12CF24D594715FF71EB45314F28C5DBD8898B697C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2047803960.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_bcd000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                          • Instruction ID: 2a227553d9826aa419a041b8bb8937b8a3664c1c285dfde75e91062577adbb4c
                                          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                          • Instruction Fuzzy Hash: 3E11DF76504240DFCB06CF00D9C4B16BFB1FB94324F24C6ADD9090B256C33AE85ACBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2047866449.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_bdd000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction ID: f1faea125bc83c7d3b5be50582310029e7aec22980982cb534ac42f409409a6d
                                          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction Fuzzy Hash: B1118B75504280DFDB16CF14D5C4B15FBB1FB84314F24C6AAD8894B796D33AD84ACB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2047803960.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_bcd000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cbdf610b67e0bfe2b494ffc354ae6d458fa9216368de890707c0b2e85eae7c7a
                                          • Instruction ID: 56d21d0c69a159de2c48349741f7082e784c725606e445c0e4c90efed69a50b6
                                          • Opcode Fuzzy Hash: cbdf610b67e0bfe2b494ffc354ae6d458fa9216368de890707c0b2e85eae7c7a
                                          • Instruction Fuzzy Hash: EF01DF351043449AE7209A29CDC4F66BFD8EF86320F18C5BFED080A286D2799C01CAB1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2047803960.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_bcd000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 14c9b38793f7bb9370f654d7e7bf9ac3e6394509d3e0f783e46c6cbe5db213f3
                                          • Instruction ID: 64126178430f074abd9d75e35411b38ab6ed93956b909bdb1857a4ae04c0e656
                                          • Opcode Fuzzy Hash: 14c9b38793f7bb9370f654d7e7bf9ac3e6394509d3e0f783e46c6cbe5db213f3
                                          • Instruction Fuzzy Hash: 8DF0C275004344AEE7108F1AC888B62FFD8EF95734F18C46AED080A286C3799C40CBB0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2058936624.000000000B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 0B880000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_b880000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d0339232ea279a416265740a4719353fb8472791cbf96b39c7b30a89ce56a50a
                                          • Instruction ID: 3f8d254b85ee2b03e5f54f7447522073e0685dc5a2ff26f8ebc0abfbb3710779
                                          • Opcode Fuzzy Hash: d0339232ea279a416265740a4719353fb8472791cbf96b39c7b30a89ce56a50a
                                          • Instruction Fuzzy Hash: DFD18A747016048FDB2AEF79C8607AAB7FBAF89700F14446DD186DB2A1DB34E902CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2053920309.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 087eb0f75f4b1f7f6f494a4064232cb6c5b1313f3c043eb30998268a9a2c27a8
                                          • Instruction ID: 7e627da70df75281f950520be1d99016231b59a22574a7915f8ac5d92d10ae02
                                          • Opcode Fuzzy Hash: 087eb0f75f4b1f7f6f494a4064232cb6c5b1313f3c043eb30998268a9a2c27a8
                                          • Instruction Fuzzy Hash: 751295B2C81766CAD710CF25E84C18D7BB1BB41328FD06B09D2621B2E1DBB415EACF49
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2048423460.0000000002630000.00000040.00000800.00020000.00000000.sdmp, Offset: 02630000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_2630000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 414724bfd2ab59750ba01dc84207953d88d3b3e529b9dd1859d866cbb6da6015
                                          • Instruction ID: 42ab0d588b314ac4cf114d3183567190ee2b7f43d6f5ea84c5000d40a026debf
                                          • Opcode Fuzzy Hash: 414724bfd2ab59750ba01dc84207953d88d3b3e529b9dd1859d866cbb6da6015
                                          • Instruction Fuzzy Hash: F2A17D32E002158FCF0ADFB4D94099EB7B2FF85304F25856AE805AB665DB71E955CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2053920309.0000000004B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04B90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_4b90000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cd1694c279df25eebc0889d6dec50f7c476389b156f19c0e8f91bd3d62044adf
                                          • Instruction ID: 403a9eb277c39f4c1715f5f223ff0815323a5c5c621f81148826cf7fe5413b3d
                                          • Opcode Fuzzy Hash: cd1694c279df25eebc0889d6dec50f7c476389b156f19c0e8f91bd3d62044adf
                                          • Instruction Fuzzy Hash: 87C11AB2C80765CBD711DF25E84C19D7BB1BB81318F906B09D1626B2E1DBB414EACF49

                                          Execution Graph

                                          Execution Coverage:11.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:91
                                          Total number of Limit Nodes:9
                                          execution_graph 35480 711e430 35481 711e498 CreateWindowExW 35480->35481 35483 711e554 35481->35483 35484 179f658 35485 179f69e GlobalMemoryStatusEx 35484->35485 35486 179f6ce 35485->35486 35497 1790848 35498 179084e 35497->35498 35499 179091b 35498->35499 35503 179138f 35498->35503 35508 7112910 35498->35508 35512 7112902 35498->35512 35505 1791393 35503->35505 35504 17914ba 35504->35498 35505->35504 35516 1798160 35505->35516 35520 1798150 35505->35520 35509 711291f 35508->35509 35528 711205c 35509->35528 35513 7112910 35512->35513 35514 711205c 2 API calls 35513->35514 35515 7112940 35514->35515 35515->35498 35518 179817f 35516->35518 35517 179823a 35517->35505 35518->35517 35524 1797838 35518->35524 35522 179817f 35520->35522 35521 179823a 35521->35505 35522->35521 35523 1797838 MoveFileA 35522->35523 35523->35521 35526 1798670 MoveFileA 35524->35526 35527 179870f 35526->35527 35527->35517 35530 7112067 35528->35530 35532 71137cc 35530->35532 35531 71142b5 35531->35531 35533 71137d7 35532->35533 35534 711490c 35533->35534 35536 7116188 35533->35536 35534->35531 35537 71161a9 35536->35537 35538 71161cd 35537->35538 35541 7116336 35537->35541 35545 7116338 35537->35545 35538->35534 35542 7116338 35541->35542 35543 711637e 35542->35543 35549 71146cc 35542->35549 35543->35538 35546 7116345 35545->35546 35547 711637e 35546->35547 35548 71146cc 2 API calls 35546->35548 35547->35538 35548->35547 35550 71146d7 35549->35550 35552 71167f0 35550->35552 35553 71146dc 35550->35553 35552->35552 35554 71146e7 35553->35554 35559 71163b4 35554->35559 35556 711685f 35563 711bbac 35556->35563 35560 71163bf 35559->35560 35561 7117ae8 35560->35561 35562 7116188 2 API calls 35560->35562 35561->35556 35562->35561 35564 7116899 35563->35564 35565 711bbc5 35563->35565 35564->35552 35570 711bdf8 35565->35570 35573 711bd80 35565->35573 35578 711bde8 35565->35578 35566 711bbfd 35582 711be38 35570->35582 35571 711be02 35571->35566 35574 711bd83 35573->35574 35575 711bd6b 35573->35575 35577 711be38 2 API calls 35574->35577 35575->35566 35576 711be02 35576->35566 35577->35576 35579 711bdf8 35578->35579 35581 711be38 2 API calls 35579->35581 35580 711be02 35580->35566 35581->35580 35583 711be59 35582->35583 35585 711be7c 35582->35585 35583->35585 35588 711c0d1 LoadLibraryExW 35583->35588 35589 711c0e0 LoadLibraryExW 35583->35589 35584 711be74 35584->35585 35586 711c080 GetModuleHandleW 35584->35586 35585->35571 35587 711c0ad 35586->35587 35587->35571 35588->35584 35589->35584 35590 7113c60 DuplicateHandle 35591 7113cf6 35590->35591 35487 7113a18 35488 7113a5e GetCurrentProcess 35487->35488 35490 7113ab0 GetCurrentThread 35488->35490 35491 7113aa9 35488->35491 35492 7113ae6 35490->35492 35493 7113aed GetCurrentProcess 35490->35493 35491->35490 35492->35493 35496 7113b23 35493->35496 35494 7113b4b GetCurrentThreadId 35495 7113b7c 35494->35495 35496->35494 35592 17980a0 35593 17980e6 DeleteFileW 35592->35593 35595 179811f 35593->35595

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 651 7173488-71734a9 652 71734ab-71734ae 651->652 653 71734d4-71734d7 652->653 654 71734b0-71734cf 652->654 655 71734dd-71734fc 653->655 656 7173c78-7173c7a 653->656 654->653 664 7173515-717351f 655->664 665 71734fe-7173501 655->665 658 7173c81-7173c84 656->658 659 7173c7c 656->659 658->652 660 7173c8a-7173c93 658->660 659->658 669 7173525-7173536 call 7172154 664->669 665->664 666 7173503-7173513 665->666 666->669 671 717353b-7173540 669->671 672 7173542-7173548 671->672 673 717354d-717382a 671->673 672->660 694 7173830-71738df 673->694 695 7173c6a-7173c77 673->695 704 71738e1-7173906 694->704 705 7173908 694->705 706 7173911-7173924 call 7172160 704->706 705->706 710 7173c51-7173c5d 706->710 711 717392a-717394c call 717216c 706->711 710->694 712 7173c63 710->712 711->710 715 7173952-717395c 711->715 712->695 715->710 716 7173962-717396d 715->716 716->710 717 7173973-7173a49 716->717 729 7173a57-7173a87 717->729 730 7173a4b-7173a4d 717->730 734 7173a95-7173aa1 729->734 735 7173a89-7173a8b 729->735 730->729 736 7173aa3-7173aa7 734->736 737 7173b01-7173b05 734->737 735->734 736->737 740 7173aa9-7173ad3 736->740 738 7173c42-7173c4b 737->738 739 7173b0b-7173b47 737->739 738->710 738->717 751 7173b55-7173b63 739->751 752 7173b49-7173b4b 739->752 747 7173ad5-7173ad7 740->747 748 7173ae1-7173afe call 7172178 740->748 747->748 748->737 755 7173b65-7173b70 751->755 756 7173b7a-7173b85 751->756 752->751 755->756 759 7173b72 755->759 760 7173b87-7173b8d 756->760 761 7173b9d-7173bae 756->761 759->756 762 7173b91-7173b93 760->762 763 7173b8f 760->763 765 7173bc6-7173bd2 761->765 766 7173bb0-7173bb6 761->766 762->761 763->761 770 7173bd4-7173bda 765->770 771 7173bea-7173c3b 765->771 767 7173bba-7173bbc 766->767 768 7173bb8 766->768 767->765 768->765 772 7173bde-7173be0 770->772 773 7173bdc 770->773 771->738 772->771 773->771
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-3723351465
                                          • Opcode ID: 40d9831a911c755a6f412aeb0f038f93a6869538d3f0eb04efd8ca96fabada73
                                          • Instruction ID: 10c1a38606d96ef2378c603e6e3888970b649253fb62f40865a412193fb86a03
                                          • Opcode Fuzzy Hash: 40d9831a911c755a6f412aeb0f038f93a6869538d3f0eb04efd8ca96fabada73
                                          • Instruction Fuzzy Hash: EE324E70E1065ACFCB15DF75D89459DB7B6FF89300F2086AAD419AB264EB30AD85CB80

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 938 7177d68-7177d86 939 7177d88-7177d8b 938->939 940 7177d8d-7177da7 939->940 941 7177dac-7177daf 939->941 940->941 942 7177db1-7177dbb 941->942 943 7177dbc-7177dbf 941->943 945 7177de2-7177de5 943->945 946 7177dc1-7177ddd 943->946 947 7177de7-7177df5 945->947 948 7177dfc-7177dfe 945->948 946->945 954 7177e0e-7177e24 947->954 955 7177df7 947->955 950 7177e05-7177e08 948->950 951 7177e00 948->951 950->939 950->954 951->950 958 717803f-7178049 954->958 959 7177e2a-7177e33 954->959 955->948 960 717804a-717807f 959->960 961 7177e39-7177e56 959->961 964 7178081-7178084 960->964 968 717802c-7178039 961->968 969 7177e5c-7177e84 961->969 966 717808a-7178099 964->966 967 71782b9-71782bc 964->967 979 717809b-71780b6 966->979 980 71780b8-71780fc 966->980 970 71782df-71782e2 967->970 971 71782be-71782da 967->971 968->958 968->959 969->968 989 7177e8a-7177e93 969->989 973 717838d-717838f 970->973 974 71782e8-71782f4 970->974 971->970 975 7178396-7178399 973->975 976 7178391 973->976 982 71782ff-7178301 974->982 975->964 981 717839f-71783a8 975->981 976->975 979->980 994 7178102-7178113 980->994 995 717828d-71782a3 980->995 986 7178303-7178309 982->986 987 7178319-717831d 982->987 990 717830d-717830f 986->990 991 717830b 986->991 992 717831f-7178329 987->992 993 717832b 987->993 989->960 998 7177e99-7177eb5 989->998 990->987 991->987 997 7178330-7178332 992->997 993->997 1003 7178119-7178136 994->1003 1004 7178278-7178287 994->1004 995->967 1000 7178334-7178337 997->1000 1001 7178343-717837c 997->1001 1008 7177ebb-7177ee5 998->1008 1009 717801a-7178026 998->1009 1000->981 1001->966 1023 7178382-717838c 1001->1023 1003->1004 1015 717813c-7178232 call 7176590 1003->1015 1004->994 1004->995 1021 7178010-7178015 1008->1021 1022 7177eeb-7177f13 1008->1022 1009->968 1009->989 1071 7178234-717823e 1015->1071 1072 7178240 1015->1072 1021->1009 1022->1021 1029 7177f19-7177f47 1022->1029 1029->1021 1035 7177f4d-7177f56 1029->1035 1035->1021 1037 7177f5c-7177f8e 1035->1037 1044 7177f90-7177f94 1037->1044 1045 7177f99-7177fb5 1037->1045 1044->1021 1046 7177f96 1044->1046 1045->1009 1047 7177fb7-717800e call 7176590 1045->1047 1046->1045 1047->1009 1073 7178245-7178247 1071->1073 1072->1073 1073->1004 1074 7178249-717824e 1073->1074 1075 7178250-717825a 1074->1075 1076 717825c 1074->1076 1077 7178261-7178263 1075->1077 1076->1077 1077->1004 1078 7178265-7178271 1077->1078 1078->1004
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q
                                          • API String ID: 0-127220927
                                          • Opcode ID: 533f9d6f9f14523711236814602df93c38f8bd167f7f03db078c63243878ac0a
                                          • Instruction ID: 8e7911d8a08b7cb6baa633f76e2ecda8668729357c5f41e7e10183f691e27530
                                          • Opcode Fuzzy Hash: 533f9d6f9f14523711236814602df93c38f8bd167f7f03db078c63243878ac0a
                                          • Instruction Fuzzy Hash: 1B029B70B002069FCB29DF69D894AAEB7F6FF84314F248529D4099B394DB35EC46CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1080 7175cd7-7175cf8 1081 7175cfa-7175cfd 1080->1081 1082 7175d34-7175d37 1081->1082 1083 7175cff-7175d1e 1081->1083 1084 7175d40-7175d43 1082->1084 1085 7175d39-7175d3b 1082->1085 1096 7175d23-7175d29 1083->1096 1097 7175d20 1083->1097 1086 7175d45-7175d4a 1084->1086 1087 7175d61-7175d64 1084->1087 1085->1084 1089 7175d4f-7175d5c 1086->1089 1090 7175d4c 1086->1090 1091 7175d66-7175d6c 1087->1091 1092 7175d73-7175d76 1087->1092 1089->1087 1090->1089 1091->1083 1095 7175d6e 1091->1095 1092->1091 1094 7175d78-7175d7b 1092->1094 1098 7175d82-7175d84 1094->1098 1099 7175d7d-7175d7f 1094->1099 1095->1092 1101 7175d9d-7175dda 1096->1101 1102 7175d2b-7175d2f 1096->1102 1097->1096 1103 7175d86 1098->1103 1104 7175d8b-7175d8e 1098->1104 1099->1098 1107 7175ddc-7175ddf 1101->1107 1102->1082 1103->1104 1104->1081 1105 7175d94-7175d9c 1104->1105 1108 7175de1-7175de8 1107->1108 1109 7175def-7175df2 1107->1109 1110 7175e40-7175e47 1108->1110 1111 7175dea 1108->1111 1112 7175df4-7175dfd 1109->1112 1113 7175e00-7175e03 1109->1113 1116 7175f95-7175fa8 1110->1116 1117 7175e4d-7175e94 1110->1117 1111->1109 1114 7175e05-7175e13 1113->1114 1115 7175e18-7175e1b 1113->1115 1114->1115 1118 7175e37-7175e3a 1115->1118 1119 7175e1d-7175e32 1115->1119 1133 7175e96-7175ea5 1117->1133 1118->1110 1122 7175fb4-7175fb6 1118->1122 1119->1118 1125 7175fbd-7175fc0 1122->1125 1126 7175fb8 1122->1126 1125->1107 1127 7175fc6-7175fd0 1125->1127 1126->1125 1135 7175fd3-7176012 1133->1135 1136 7175eab-7175ec1 1133->1136 1140 7176014-7176017 1135->1140 1136->1135 1139 7175ec7-7175ecf 1136->1139 1139->1133 1143 7175ed1-7175ed7 1139->1143 1141 717602f-7176032 1140->1141 1142 7176019-717602a 1140->1142 1144 7176045-7176048 1141->1144 1145 7176034-7176040 1141->1145 1142->1141 1146 7175f37-7175f87 call 7174b08 1143->1146 1147 7175ed9-7175edc 1143->1147 1148 717604e-7176055 1144->1148 1149 71760d9-71760dc 1144->1149 1145->1144 1195 7175f92 1146->1195 1196 7175f89 1146->1196 1147->1135 1151 7175ee2-7175eed 1147->1151 1154 717610b-717611e 1148->1154 1155 717605b-71760c6 1148->1155 1157 71760ef-71760f2 1149->1157 1158 71760de-71760ea 1149->1158 1151->1135 1153 7175ef3-7175efd 1151->1153 1153->1135 1159 7175f03-7175f0d 1153->1159 1201 71760cf-71760d6 1155->1201 1160 7176106-7176109 1157->1160 1161 71760f4-71760fb 1157->1161 1158->1157 1159->1135 1163 7175f13-7175f28 1159->1163 1160->1154 1164 7176121-7176124 1160->1164 1161->1148 1162 7176101 1161->1162 1162->1160 1163->1135 1169 7175f2e-7175f35 1163->1169 1170 7176126-7176145 1164->1170 1171 7176162-7176165 1164->1171 1169->1146 1169->1147 1191 71761c1-71761cb 1170->1191 1174 7176167-717617a 1171->1174 1175 717617f-7176182 1171->1175 1174->1175 1176 7176184-7176193 1175->1176 1177 7176198-717619b 1175->1177 1176->1177 1179 71761af-71761b1 1177->1179 1180 717619d-71761aa 1177->1180 1185 71761b3 1179->1185 1186 71761b8-71761bb 1179->1186 1180->1179 1185->1186 1186->1140 1186->1191 1195->1116 1196->1195
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPbq$\Obq
                                          • API String ID: 0-409418754
                                          • Opcode ID: 58a951c24c7e2210e6823b7a42e8b71383fbd1c7266188041ef9fe3d8e473625
                                          • Instruction ID: d85c83524a5ee81bb19545e6640234a08b08cda494d4c4d1c5442b987b6a03b9
                                          • Opcode Fuzzy Hash: 58a951c24c7e2210e6823b7a42e8b71383fbd1c7266188041ef9fe3d8e473625
                                          • Instruction Fuzzy Hash: 54E1F271B001158FDB25DB68C894AAEBBF6FF89310F25846AE40ADB392CB71DC51C791
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef729a1dbe59508189075a0e0630bf39618c6c0f7b0ed75810cb69c8d6c164b9
                                          • Instruction ID: 75e76333be8386b0102155610b2938a190107c5fe603337964d9b8c182009bd1
                                          • Opcode Fuzzy Hash: ef729a1dbe59508189075a0e0630bf39618c6c0f7b0ed75810cb69c8d6c164b9
                                          • Instruction Fuzzy Hash: AC62DF74B006069FCB25DB68D594AADB7F2FF88314F108469E40AEB394DB35EC46CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5043d4c9ece5dd48fb087a95c22ae704a6deb8a1d34305755fff75be57c152a7
                                          • Instruction ID: 703268ff2a8747b30a2ac7261c043f6741be35469d0d9cb45c7a2bb8b4d45431
                                          • Opcode Fuzzy Hash: 5043d4c9ece5dd48fb087a95c22ae704a6deb8a1d34305755fff75be57c152a7
                                          • Instruction Fuzzy Hash: 5E324274B0020A9FDF15DF68D590AADB7BAFB88310F108529E405EB395DB35EC46CBA1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4073a23a9d809e18ca8e6a360bd7453da2e5b185f093b67eb08627f6d0c9d7db
                                          • Instruction ID: f83ae2f9662626bce56d6071dc1be54844549e3a579d9ba11e59a1bde36ddde7
                                          • Opcode Fuzzy Hash: 4073a23a9d809e18ca8e6a360bd7453da2e5b185f093b67eb08627f6d0c9d7db
                                          • Instruction Fuzzy Hash: 4512E3B1F002069BDB25CF65C8806AEB7B7FB84314F248869D84A9B3C5DB34DD56CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e92f59fb9f6f2d1bda378b5a75d709475ab5d2f45e357065facb05f003920dab
                                          • Instruction ID: 5275aaebd3a7bdcffe53d70f547002b01be145215339a1a06641e9454fc3f58b
                                          • Opcode Fuzzy Hash: e92f59fb9f6f2d1bda378b5a75d709475ab5d2f45e357065facb05f003920dab
                                          • Instruction Fuzzy Hash: 9E225DF0A0420A8FDF35CA69D4907ADB7B6EB49310F24882AE459DB3D5DB38DC85CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 527 717acb8-717acd6 528 717acd8-717acdb 527->528 529 717acf5-717acf8 528->529 530 717acdd-717acf0 528->530 531 717ad0c-717ad0f 529->531 532 717acfa-717ad07 529->532 530->529 533 717ad11-717ad1a 531->533 534 717ad29-717ad2c 531->534 532->531 537 717ad20-717ad24 533->537 538 717aeef-717af26 533->538 539 717ad4f-717ad52 534->539 540 717ad2e-717ad4a 534->540 537->534 547 717af28-717af2b 538->547 541 717ad54-717ad5d 539->541 542 717ad62-717ad65 539->542 540->539 541->542 545 717aed5-717aede 542->545 546 717ad6b-717ad6e 542->546 545->533 548 717aee4-717aeee 545->548 549 717ad70-717ad75 546->549 550 717ad78-717ad7b 546->550 553 717af2d-717af31 547->553 554 717af38-717af3b 547->554 549->550 551 717ad7d-717ad81 550->551 552 717ad8c-717ad8e 550->552 551->548 556 717ad87 551->556 559 717ad95-717ad98 552->559 560 717ad90 552->560 557 717af33 553->557 558 717af51-717af8c 553->558 561 717af3d-717af47 554->561 562 717af48-717af4b 554->562 556->552 557->554 571 717af92-717af9e 558->571 572 717b17f-717b192 558->572 559->528 563 717ad9e-717adc2 559->563 560->559 562->558 564 717b1b4-717b1b7 562->564 582 717aed2 563->582 583 717adc8-717add7 563->583 566 717b1da-717b1dd 564->566 567 717b1b9-717b1d5 564->567 568 717b1df call 717b212 566->568 569 717b1ec-717b1ee 566->569 567->566 577 717b1e5-717b1e7 568->577 574 717b1f5-717b1f8 569->574 575 717b1f0 569->575 584 717afa0-717afb9 571->584 585 717afbe-717b002 571->585 576 717b194 572->576 574->547 579 717b1fe-717b208 574->579 575->574 576->564 577->569 582->545 588 717adef-717ae2a call 7176590 583->588 589 717add9-717addf 583->589 584->576 600 717b004-717b016 585->600 601 717b01e-717b05d 585->601 608 717ae42-717ae59 588->608 609 717ae2c-717ae32 588->609 591 717ade3-717ade5 589->591 592 717ade1 589->592 591->588 592->588 600->601 606 717b144-717b159 601->606 607 717b063-717b13e call 7176590 601->607 606->572 607->606 619 717ae71-717ae82 608->619 620 717ae5b-717ae61 608->620 612 717ae36-717ae38 609->612 613 717ae34 609->613 612->608 613->608 626 717ae84-717ae8a 619->626 627 717ae9a-717aecb 619->627 622 717ae65-717ae67 620->622 623 717ae63 620->623 622->619 623->619 628 717ae8e-717ae90 626->628 629 717ae8c 626->629 627->582 628->627 629->627
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-1273862796
                                          • Opcode ID: 365310862f6c69552cd0ad9ef4eca1e52dc307bb7cefa9dbd9f8ab7228ea180e
                                          • Instruction ID: 7d07cdf07af0b0a847ad6be79fb39c68ab6f2c2dc3f409ebe1b4d972d573ea22
                                          • Opcode Fuzzy Hash: 365310862f6c69552cd0ad9ef4eca1e52dc307bb7cefa9dbd9f8ab7228ea180e
                                          • Instruction Fuzzy Hash: BDE14170A1020A8FDF29DF69D4906AEB7B7FF89304F208529D409AB395DB35DC46CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 781 7113a0a-7113aa7 GetCurrentProcess 786 7113ab0-7113ae4 GetCurrentThread 781->786 787 7113aa9-7113aaf 781->787 788 7113ae6-7113aec 786->788 789 7113aed-7113b21 GetCurrentProcess 786->789 787->786 788->789 790 7113b23-7113b29 789->790 791 7113b2a-7113b45 call 7113bf2 789->791 790->791 795 7113b4b-7113b7a GetCurrentThreadId 791->795 796 7113b83-7113be5 795->796 797 7113b7c-7113b82 795->797 797->796
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 07113A96
                                          • GetCurrentThread.KERNEL32 ref: 07113AD3
                                          • GetCurrentProcess.KERNEL32 ref: 07113B10
                                          • GetCurrentThreadId.KERNEL32 ref: 07113B69
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 3a75e42138304eadaf683b9c6782bd06cfd2afdf601ee31fb98f53ebbb78141b
                                          • Instruction ID: 1a1c39fc2dd327c2b6d56275905e6d98b0e07689c494d1c14beb2ef6dfa6b4eb
                                          • Opcode Fuzzy Hash: 3a75e42138304eadaf683b9c6782bd06cfd2afdf601ee31fb98f53ebbb78141b
                                          • Instruction Fuzzy Hash: 715168B09003099FDB14DFA9D548BAEBBF5FF48314F208469E419AB3A0D7386985CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 804 7113a18-7113aa7 GetCurrentProcess 808 7113ab0-7113ae4 GetCurrentThread 804->808 809 7113aa9-7113aaf 804->809 810 7113ae6-7113aec 808->810 811 7113aed-7113b21 GetCurrentProcess 808->811 809->808 810->811 812 7113b23-7113b29 811->812 813 7113b2a-7113b45 call 7113bf2 811->813 812->813 817 7113b4b-7113b7a GetCurrentThreadId 813->817 818 7113b83-7113be5 817->818 819 7113b7c-7113b82 817->819 819->818
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 07113A96
                                          • GetCurrentThread.KERNEL32 ref: 07113AD3
                                          • GetCurrentProcess.KERNEL32 ref: 07113B10
                                          • GetCurrentThreadId.KERNEL32 ref: 07113B69
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: cb164b582e3b8cc439555cfa18bae9709005bf261ed23c54eec8f79f316e811d
                                          • Instruction ID: 590896de5b6248d560ae31c0e3cc58989bc7c0ed4770e05d77e7cb785701e1f9
                                          • Opcode Fuzzy Hash: cb164b582e3b8cc439555cfa18bae9709005bf261ed23c54eec8f79f316e811d
                                          • Instruction Fuzzy Hash: AB5137B09003099FDB14DFA9D548BAEBBF5FF48314F208469D419AB3A0D738A985CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 826 7179140-7179165 827 7179167-717916a 826->827 828 7179170-7179185 827->828 829 7179a28-7179a2b 827->829 837 7179187-717918d 828->837 838 717919d-71791b3 828->838 830 7179a51-7179a53 829->830 831 7179a2d-7179a4c 829->831 832 7179a55 830->832 833 7179a5a-7179a5d 830->833 831->830 832->833 833->827 836 7179a63-7179a6d 833->836 839 7179191-7179193 837->839 840 717918f 837->840 843 71791be-71791c0 838->843 839->838 840->838 844 71791c2-71791c8 843->844 845 71791d8-7179249 843->845 846 71791cc-71791ce 844->846 847 71791ca 844->847 856 7179275-7179291 845->856 857 717924b-717926e 845->857 846->845 847->845 862 7179293-71792b6 856->862 863 71792bd-71792d8 856->863 857->856 862->863 868 7179303-717931e 863->868 869 71792da-71792fc 863->869 874 7179343-7179351 868->874 875 7179320-717933c 868->875 869->868 876 7179353-717935c 874->876 877 7179361-71793db 874->877 875->874 876->836 883 71793dd-71793fb 877->883 884 7179428-717943d 877->884 888 7179417-7179426 883->888 889 71793fd-717940c 883->889 884->829 888->883 888->884 889->888
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: 0ebacdb6342739cab45836868cffe0d246a917c03e83137c04d41ef1c4c261db
                                          • Instruction ID: c3cc6a8c42232d7b10db7cb6f79829ba952f6fd077c3b910b56d89822dc5c172
                                          • Opcode Fuzzy Hash: 0ebacdb6342739cab45836868cffe0d246a917c03e83137c04d41ef1c4c261db
                                          • Instruction Fuzzy Hash: 41915170B0020A8FDB59DB65D950BAEB3F6FF89340F108469C419EB384EB34AD46CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 892 7174b90-7174bb4 893 7174bb6-7174bb9 892->893 894 7174bbf-7174cb7 893->894 895 7175298-717529b 893->895 915 7174cbd-7174d0a call 7175439 894->915 916 7174d3a-7174d41 894->916 896 717529d-71752b7 895->896 897 71752bc-71752be 895->897 896->897 899 71752c5-71752c8 897->899 900 71752c0 897->900 899->893 902 71752ce-71752db 899->902 900->899 929 7174d10-7174d2c 915->929 917 7174d47-7174db7 916->917 918 7174dc5-7174dce 916->918 935 7174dc2 917->935 936 7174db9 917->936 918->902 932 7174d37 929->932 933 7174d2e 929->933 932->916 933->932 935->918 936->935
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fbq$XPbq$\Obq
                                          • API String ID: 0-4057264190
                                          • Opcode ID: ff2aff8d3d5a609129794d7c313bd34d6a46cf7e989ac47255b1f9ef1a423dd4
                                          • Instruction ID: 772fc2532cd2247183658c99b355c400fcd800a6b5e36ec8e8b9874453e91063
                                          • Opcode Fuzzy Hash: ff2aff8d3d5a609129794d7c313bd34d6a46cf7e989ac47255b1f9ef1a423dd4
                                          • Instruction Fuzzy Hash: 65618170B002099FEB559FA5C8547AEBBF7FB88310F20842AD50AEB395DB748C41CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1342 7179130-7179165 1344 7179167-717916a 1342->1344 1345 7179170-7179185 1344->1345 1346 7179a28-7179a2b 1344->1346 1354 7179187-717918d 1345->1354 1355 717919d-71791b3 1345->1355 1347 7179a51-7179a53 1346->1347 1348 7179a2d-7179a4c 1346->1348 1349 7179a55 1347->1349 1350 7179a5a-7179a5d 1347->1350 1348->1347 1349->1350 1350->1344 1353 7179a63-7179a6d 1350->1353 1356 7179191-7179193 1354->1356 1357 717918f 1354->1357 1360 71791be-71791c0 1355->1360 1356->1355 1357->1355 1361 71791c2-71791c8 1360->1361 1362 71791d8-7179249 1360->1362 1363 71791cc-71791ce 1361->1363 1364 71791ca 1361->1364 1373 7179275-7179291 1362->1373 1374 717924b-717926e 1362->1374 1363->1362 1364->1362 1379 7179293-71792b6 1373->1379 1380 71792bd-71792d8 1373->1380 1374->1373 1379->1380 1385 7179303-717931e 1380->1385 1386 71792da-71792fc 1380->1386 1391 7179343-7179351 1385->1391 1392 7179320-717933c 1385->1392 1386->1385 1393 7179353-717935c 1391->1393 1394 7179361-71793db 1391->1394 1392->1391 1393->1353 1400 71793dd-71793fb 1394->1400 1401 7179428-717943d 1394->1401 1405 7179417-7179426 1400->1405 1406 71793fd-717940c 1400->1406 1401->1346 1405->1400 1405->1401 1406->1405
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q
                                          • API String ID: 0-127220927
                                          • Opcode ID: 531cb6fe1fec8e064956c7249bc06f213151d2abea75d544ad6c62ab9ee1928a
                                          • Instruction ID: a9e345d1170190d73dfeafc73091b8fbfb4120f6585f75cbd19810c16eaf8cf9
                                          • Opcode Fuzzy Hash: 531cb6fe1fec8e064956c7249bc06f213151d2abea75d544ad6c62ab9ee1928a
                                          • Instruction Fuzzy Hash: CA515F70B011069FDB59DB79D850BAEB3F6FB88750F108469C419DB384EB35AC46CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1432 711be38-711be57 1433 711be83-711be87 1432->1433 1434 711be59-711be66 call 711b010 1432->1434 1436 711be89-711be93 1433->1436 1437 711be9b-711bedc 1433->1437 1439 711be68 1434->1439 1440 711be7c 1434->1440 1436->1437 1443 711bee9-711bef7 1437->1443 1444 711bede-711bee6 1437->1444 1491 711be6e call 711c0d1 1439->1491 1492 711be6e call 711c0e0 1439->1492 1440->1433 1445 711bef9-711befe 1443->1445 1446 711bf1b-711bf1d 1443->1446 1444->1443 1448 711bf00-711bf07 call 711b01c 1445->1448 1449 711bf09 1445->1449 1451 711bf20-711bf27 1446->1451 1447 711be74-711be76 1447->1440 1450 711bfb8-711c030 1447->1450 1453 711bf0b-711bf19 1448->1453 1449->1453 1482 711c032-711c034 1450->1482 1483 711c05f-711c071 1450->1483 1454 711bf34-711bf3b 1451->1454 1455 711bf29-711bf31 1451->1455 1453->1451 1457 711bf48-711bf51 call 7114428 1454->1457 1458 711bf3d-711bf45 1454->1458 1455->1454 1463 711bf53-711bf5b 1457->1463 1464 711bf5e-711bf63 1457->1464 1458->1457 1463->1464 1465 711bf81-711bf85 1464->1465 1466 711bf65-711bf6c 1464->1466 1493 711bf88 call 711c391 1465->1493 1494 711bf88 call 711c3a0 1465->1494 1466->1465 1468 711bf6e-711bf7e call 71195f8 call 711b02c 1466->1468 1468->1465 1471 711bf8b-711bf8e 1473 711bfb1-711bfb7 1471->1473 1474 711bf90-711bfae 1471->1474 1474->1473 1484 711c073-711c078 1482->1484 1485 711c036-711c05e 1482->1485 1483->1484 1486 711c080-711c0ab GetModuleHandleW 1484->1486 1487 711c07a-711c07d 1484->1487 1485->1483 1488 711c0b4-711c0c8 1486->1488 1489 711c0ad-711c0b3 1486->1489 1487->1486 1489->1488 1491->1447 1492->1447 1493->1471 1494->1471
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0711C09E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 60ba74769b4b824f077f71ff3add6f729841674065c9afdee8c4ccab87997da7
                                          • Instruction ID: 21ffe8d62c33776a499acbfe5f07f0a8f6f6e6e938b7dcb97589de798838e6e4
                                          • Opcode Fuzzy Hash: 60ba74769b4b824f077f71ff3add6f729841674065c9afdee8c4ccab87997da7
                                          • Instruction Fuzzy Hash: 328156B0A04B068FD725DF29D4447AABBF5FF88300F00892ED48ADBA91D735E945CB91
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0711E542
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 37cdfc896caf0796d3a9e7d4ea0fe1ed1a4c80e892249c0ab6b7c76e1546959d
                                          • Instruction ID: 6f42b411caf1870dc32e40d01f841938553cea74bc475788d120da6e9ce48c34
                                          • Opcode Fuzzy Hash: 37cdfc896caf0796d3a9e7d4ea0fe1ed1a4c80e892249c0ab6b7c76e1546959d
                                          • Instruction Fuzzy Hash: 7751C1B5D10309DFDB14CF9AD884ADEBBB5FF48310F24812AE819AB250D7749985CF91
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0711E542
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 53e5109424a31390c22be0363b0057fc238e32956542a08636efadf10b760dcc
                                          • Instruction ID: c76b06b10e3a42f74ba430aecd2190faa87e6474dd513a917cc63281940ebae2
                                          • Opcode Fuzzy Hash: 53e5109424a31390c22be0363b0057fc238e32956542a08636efadf10b760dcc
                                          • Instruction Fuzzy Hash: 8141C0B1D10309DFDB14CF9AC884ADEBBB5FF48310F24812AE819AB250D774A885CF91
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 07113CE7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 8accab1bf4fdb922ef832c2b7294757fe0bed5419496ad2df7aa5da692518b4c
                                          • Instruction ID: c7cfcee6e4d7f61788996d680624c3e1e649ebfee151c73bfbeba0c37425ce3e
                                          • Opcode Fuzzy Hash: 8accab1bf4fdb922ef832c2b7294757fe0bed5419496ad2df7aa5da692518b4c
                                          • Instruction Fuzzy Hash: 2221E5B5D00259AFDB10CF9AD584ADEFFF8FB48320F14841AE914A7250D379A950CFA5
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 01798700
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3279751475.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_1790000_z17invoice.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID:
                                          • API String ID: 3562171763-0
                                          • Opcode ID: 35172697383fb910fa561cc9eb1ca22c55aac2093cf5175ff94860c80f1319b4
                                          • Instruction ID: 5e32f4d5ec288b51135cd9458a060b6f5a3330860066c8b5f9f25dbfe5fbd0f8
                                          • Opcode Fuzzy Hash: 35172697383fb910fa561cc9eb1ca22c55aac2093cf5175ff94860c80f1319b4
                                          • Instruction Fuzzy Hash: E62107B6C012099FDB10CF99E884ADEFFF5FB89310F14845AE918AB205D7755944CBA1
                                          APIs
                                          • MoveFileA.KERNEL32(?,00000000,?,?), ref: 01798700
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3279751475.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_1790000_z17invoice.jbxd
                                          Similarity
                                          • API ID: FileMove
                                          • String ID:
                                          • API String ID: 3562171763-0
                                          • Opcode ID: b44bd3d07732b36569f659565b359efa384b8ae78f6147ba872482018456f254
                                          • Instruction ID: 7da52e60bb5bb68ce4a60573be0ddfc2b9f02318ba1fe0a99a73fa82d5c007f2
                                          • Opcode Fuzzy Hash: b44bd3d07732b36569f659565b359efa384b8ae78f6147ba872482018456f254
                                          • Instruction Fuzzy Hash: 8B2105B6C012099FCF50CF99E884ADEFBF5FB89310F14845AE918AB205D375A944CBA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 07113CE7
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: a034e2dd4aa5dc16259b63822c295ae8632f2af4723fb6b7450fb89cdc58e12c
                                          • Instruction ID: 99468990193ecdcd26a2e74ea4c2baf2ace6a9e4b4e9a33535a30cf0af4cb7c0
                                          • Opcode Fuzzy Hash: a034e2dd4aa5dc16259b63822c295ae8632f2af4723fb6b7450fb89cdc58e12c
                                          • Instruction Fuzzy Hash: 2921E4B59002099FDB10CF9AD584ADEBFF8FB48310F14841AE918A7350D379A940CFA1
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 01798110
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3279751475.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_1790000_z17invoice.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: d76cef72207eb8ead01d7b1a21fb723862e2311e991fd8f06803cf2d20c8f651
                                          • Instruction ID: 5a7cbfaf31badb4ba37079abb10672ae78fe09a1c5992771db5bceabf5cd010b
                                          • Opcode Fuzzy Hash: d76cef72207eb8ead01d7b1a21fb723862e2311e991fd8f06803cf2d20c8f651
                                          • Instruction Fuzzy Hash: 4D2127B1C006599BCB14CFAAD845ADEFBB4FF48310F14816AD918A7240D778A944CFE6
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0179F6BF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3279751475.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_1790000_z17invoice.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 8797186d3f8520b1b88a8d39ec30f841c99df238ff275ad4168b627080d71b6d
                                          • Instruction ID: 1dbcb35dcf88abede402cd11323ebba4919d1df2a8dd812ccf0b676c15c1c280
                                          • Opcode Fuzzy Hash: 8797186d3f8520b1b88a8d39ec30f841c99df238ff275ad4168b627080d71b6d
                                          • Instruction Fuzzy Hash: 8B1133B1C002599BCB10CFAAD444ADEFFF8EF48320F10812AE918A3250D778A954CFE5
                                          APIs
                                          • DeleteFileW.KERNELBASE(00000000), ref: 01798110
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3279751475.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_1790000_z17invoice.jbxd
                                          Similarity
                                          • API ID: DeleteFile
                                          • String ID:
                                          • API String ID: 4033686569-0
                                          • Opcode ID: dfbd0c528a891c548139ef91fecbc7f194619c38c5ad104eb2d5b6f9f19de03e
                                          • Instruction ID: 98544e6c8728b6c847c37efbb69c96b3de0843f5a62c87f458c2d1d9d017e48c
                                          • Opcode Fuzzy Hash: dfbd0c528a891c548139ef91fecbc7f194619c38c5ad104eb2d5b6f9f19de03e
                                          • Instruction Fuzzy Hash: B21130B1C0065A9BCB14CF9AD445AAEFBB4FF48320F10812AD918A7240D778A944CFA6
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0711C119,00000800,00000000,00000000), ref: 0711C30A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 4ad24415b0765d4c43ba5b614600ba9272e6685c3c0f6b35a55fcabe289c5562
                                          • Instruction ID: dce525126bfa88be068aa543085f35e63dedc02b6fb655531d840efeb01767a9
                                          • Opcode Fuzzy Hash: 4ad24415b0765d4c43ba5b614600ba9272e6685c3c0f6b35a55fcabe289c5562
                                          • Instruction Fuzzy Hash: C21123B6C003099FCB10CF9AD444ADEFBF9EB88310F10842AE919BB240C379A544CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0711C119,00000800,00000000,00000000), ref: 0711C30A
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: ce3250c765a5b314de67428de6e678e0723ebbfd3b6eeb8a2e6d95095ae750ca
                                          • Instruction ID: 221ebf605b971f11c58daedfb74a0d5e115b5f176898db35bdfeb518f08bbc46
                                          • Opcode Fuzzy Hash: ce3250c765a5b314de67428de6e678e0723ebbfd3b6eeb8a2e6d95095ae750ca
                                          • Instruction Fuzzy Hash: 8F11F0B6C002098FDB10CF9AD944ADEFBF5EB88310F14842AE559BB250C379A545CFA5
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0179F6BF
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3279751475.0000000001790000.00000040.00000800.00020000.00000000.sdmp, Offset: 01790000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_1790000_z17invoice.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 9601bb8370d107651f771203e33c615929bbeeb46e6f3ab2643c162e8b7c521a
                                          • Instruction ID: 5af24ca564bdeadc533442a9b25b569ece2d47676cee41d3dc2fa7a07dc0a1c5
                                          • Opcode Fuzzy Hash: 9601bb8370d107651f771203e33c615929bbeeb46e6f3ab2643c162e8b7c521a
                                          • Instruction Fuzzy Hash: 93111FB1C0065A9BCB10DFAAD444A9EFBF8EF48320F10812AD918A7250D378A954CFE5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0711C09E
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3302069421.0000000007110000.00000040.00000800.00020000.00000000.sdmp, Offset: 07110000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7110000_z17invoice.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: b6568b126ae1fc396f03b78a5530b3306dcf28b20ef1a1ee63366fe97aa7459a
                                          • Instruction ID: 1c1dd4bc82f84e02f2b5773162463343f1c4df1fb24c89dd4d20de83785a285c
                                          • Opcode Fuzzy Hash: b6568b126ae1fc396f03b78a5530b3306dcf28b20ef1a1ee63366fe97aa7459a
                                          • Instruction Fuzzy Hash: 0711E0B5C002498FCB10DF9AD444BDEFBF8EF88314F10842AD919A7250D379A545CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPbq
                                          • API String ID: 0-864591470
                                          • Opcode ID: 7a3f3c2a16e24e17975ce9996bd17a5247edebba82e7192ade9aa4b7e0ab9a12
                                          • Instruction ID: 4c131c647ab3be9aebecdbf3bfe7e3f78f1b04d61d23dbd0fce046bcdd4294e9
                                          • Opcode Fuzzy Hash: 7a3f3c2a16e24e17975ce9996bd17a5247edebba82e7192ade9aa4b7e0ab9a12
                                          • Instruction Fuzzy Hash: 1D414D71A002099FDB55DFA5C854BAEBBF7FF88710F20852AD106AB395DB749C01CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q
                                          • API String ID: 0-3168235125
                                          • Opcode ID: a86b28d530f4c8be41822da320a83964da4065fef8bfa7fc6b4fcaee4263b1e5
                                          • Instruction ID: 68289405180f1f254db1ed51b8f21bc7c9312599c42d4d03fd2c2f9eecd41921
                                          • Opcode Fuzzy Hash: a86b28d530f4c8be41822da320a83964da4065fef8bfa7fc6b4fcaee4263b1e5
                                          • Instruction Fuzzy Hash: A64182B0B0030A9FDB25DF65D85469EBBB6FF85310F208429E445E7288EF74D946CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q
                                          • API String ID: 0-3168235125
                                          • Opcode ID: 25700dea34865962f30b3bcebe69b09bb3bdaec013d2ec84c1cdf4ab7d320113
                                          • Instruction ID: fea9933880325c142fe8273f81ff64bc74ef695225c126654062507d2879fd18
                                          • Opcode Fuzzy Hash: 25700dea34865962f30b3bcebe69b09bb3bdaec013d2ec84c1cdf4ab7d320113
                                          • Instruction Fuzzy Hash: D531BE70B002028FCB199B74D55466E7AF7BF89310F208429E406DB399DF78DD46CB95
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q
                                          • API String ID: 0-1007455737
                                          • Opcode ID: 2a08b64a352903ef02b8f428fbbac7f1035ee1d31eaa99d4cbdce047d2a25eab
                                          • Instruction ID: e299bf03349055eefc0290595f795bc65a1cf80cc1433aa6d2a16a7476ba79f0
                                          • Opcode Fuzzy Hash: 2a08b64a352903ef02b8f428fbbac7f1035ee1d31eaa99d4cbdce047d2a25eab
                                          • Instruction Fuzzy Hash: F2F0C2B1B04206DBCF2D9E8DE99867CB7BAEB44314F14446AC909DB2C1C735DD05C761
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 976411d7f736649469569b4518a4c24cc6b01ac128695f51405bdf1cf4d96d97
                                          • Instruction ID: f0952a711fbba09da760fcb9ab7c2540eb3600568a1c8c9d3204d15a3693d972
                                          • Opcode Fuzzy Hash: 976411d7f736649469569b4518a4c24cc6b01ac128695f51405bdf1cf4d96d97
                                          • Instruction Fuzzy Hash: 75926674A00205CFDB25CB68C584AADB7F2FF49314F5484A9D45AEB3A5DB35EC86CB80
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 73b6d27ba2303ba97a2e104fe3a63c7b4cd7d3546619d3bf96e42dbea3da66ca
                                          • Instruction ID: 5de1012eb3a7c3dfa5f0dd8d8dde5d4ce93b361e8395f07c0ac3ca30a1604c67
                                          • Opcode Fuzzy Hash: 73b6d27ba2303ba97a2e104fe3a63c7b4cd7d3546619d3bf96e42dbea3da66ca
                                          • Instruction Fuzzy Hash: C2A149F0E0420A8BDF36CA68D480BADB7B5EB49314F24896AE459DF2D1D734DC86CB51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7d38a4371221820db5b4142bed27a5fa3fed21d46495b3005f933f9f52e64b5e
                                          • Instruction ID: a99d4ea248f2bbd49c479cef584498284e88543d406e8fc6c832995866165490
                                          • Opcode Fuzzy Hash: 7d38a4371221820db5b4142bed27a5fa3fed21d46495b3005f933f9f52e64b5e
                                          • Instruction Fuzzy Hash: 9561C1B1F005124BDB159A6AC880A5FBAEBAFD4210F254479D80EDB364EF69DD0287D2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2d5785bd745fb4712268ac73a249dd6959c078e2b7f1ccd05b151084ed1d6c15
                                          • Instruction ID: 95fe19597cf9d9beed9d973aa7f02d21b0b95d121f304214f0ae097ddfbcfb73
                                          • Opcode Fuzzy Hash: 2d5785bd745fb4712268ac73a249dd6959c078e2b7f1ccd05b151084ed1d6c15
                                          • Instruction Fuzzy Hash: 95814B70B0020A8FDB15DFB5D4546AEB7F7AB89304F208529D80ADB394EB34DC46CB92
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab1ef179445ce6be608d2472d5633ea8521ef182acd185bea5716296c32df73a
                                          • Instruction ID: c2b638c41254fa799b3a7afaf551c34c6a7655790f91349d63a84538d0400bcc
                                          • Opcode Fuzzy Hash: ab1ef179445ce6be608d2472d5633ea8521ef182acd185bea5716296c32df73a
                                          • Instruction Fuzzy Hash: F5914F70E0065A8FDF21DFA8C890B9DB7B1FF85300F208599D54DAB295DB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d2a390ed7e47ca138413cb76ecf2bbb1240c4baccb976540eb3157443cf5b8e
                                          • Instruction ID: 18d01824d475ad8994f94aae4811d0ce672b69299e519b48fb63eab4cce5f12d
                                          • Opcode Fuzzy Hash: 4d2a390ed7e47ca138413cb76ecf2bbb1240c4baccb976540eb3157443cf5b8e
                                          • Instruction Fuzzy Hash: A9913170E0065A8BDF20DFA4C890B9DB7B1FF85304F208599D54DBB295DB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: df4173c634175546a3ac46f94bc20ea4501745aa33a91008969561e02c406077
                                          • Instruction ID: 82965b9b20590dc1b08ec3de883c60006084d53cb7f2ea4b42e425962c1e7cc4
                                          • Opcode Fuzzy Hash: df4173c634175546a3ac46f94bc20ea4501745aa33a91008969561e02c406077
                                          • Instruction Fuzzy Hash: 8C711D70A002099FDB15DFA8D994AAEF7FAFF88300F248469D409AB355DB34ED46CB51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 00657bd122c0c81513d161653c0989bc8bc5b37f8af73ddae1f160448dff7560
                                          • Instruction ID: 5c68a13ea0f2504092fef016b5ddc7eb78f2c5875614f1d6ecfbbd7031e8f0c3
                                          • Opcode Fuzzy Hash: 00657bd122c0c81513d161653c0989bc8bc5b37f8af73ddae1f160448dff7560
                                          • Instruction Fuzzy Hash: 12711C70A002099FDB15DFA8D994AAEF7FAFF88300F248469D409AB355DB34ED46CB51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 87e341e182a494470c0e6c1afe5f01393aa0e561b9fa5e33897dea26017ba9bc
                                          • Instruction ID: 2190e56030c578dfd1350a749e8e4f51399c9671541144cb65fef853a7bde5b7
                                          • Opcode Fuzzy Hash: 87e341e182a494470c0e6c1afe5f01393aa0e561b9fa5e33897dea26017ba9bc
                                          • Instruction Fuzzy Hash: D851D5B1A00105DFCB24AB78E4846AEB7BAFF84315F108869E10AD7291DB359947CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8d59ca099dfe7065a4e5f04546e4286fb0a3a1d6c6768ed5c1542b2956c3d4a8
                                          • Instruction ID: 74308e716f9dd04d73459f56744aec3c1698d65407d9fcdaea467e9bb902e06c
                                          • Opcode Fuzzy Hash: 8d59ca099dfe7065a4e5f04546e4286fb0a3a1d6c6768ed5c1542b2956c3d4a8
                                          • Instruction Fuzzy Hash: 0451C2F07002069FEF25566CE95473F666EEB89710F20492AE40AD73D5CA2CCC47C3A2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7d536fb163072a039b3f68f0cadf3c55366b5ef79e9c3f1c776ccccb69e36cf3
                                          • Instruction ID: 8ec68bfc25262a330511a99f370da57bf37e48f12c244e5c955ba148453dde27
                                          • Opcode Fuzzy Hash: 7d536fb163072a039b3f68f0cadf3c55366b5ef79e9c3f1c776ccccb69e36cf3
                                          • Instruction Fuzzy Hash: 3251A3F07102069FEF25566CE85473F666EEB89750F20492AE40AD73D5CA6CCC47C3A2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e8634b04f1e5b49e3f0ef2601491a1c23b8ddb704ff17c179eb4b70fff02a906
                                          • Instruction ID: f0d26e5aa95d01054ab6892bc5d0314be86ae35e95e4231797e11d0249eab495
                                          • Opcode Fuzzy Hash: e8634b04f1e5b49e3f0ef2601491a1c23b8ddb704ff17c179eb4b70fff02a906
                                          • Instruction Fuzzy Hash: 1E4183F07102069FEF25566CE95473F666EDB89750F20492AE40AD73E5CA6CCC47C3A2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19f7451c351fb4523c30295d7f98a4cf577cb9b1f989cb53605ce54956d6798a
                                          • Instruction ID: 67e51afd45eea1c45e4c5e59768dbc44411c35ed089e33d6606ea17d967d66fb
                                          • Opcode Fuzzy Hash: 19f7451c351fb4523c30295d7f98a4cf577cb9b1f989cb53605ce54956d6798a
                                          • Instruction Fuzzy Hash: 784160B1A002068FDB21CFA9D8C1AAFBBB3EB85310F50492AE116D7690D730E955CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 54684779562b758a9a7a18e9df0a0b907fef58b9a935651cdb46ad4d42f17cd5
                                          • Instruction ID: 2e976efde43a73d86e3da791c2a1ffa707cef28594a0d77107cbedfd63bc87af
                                          • Opcode Fuzzy Hash: 54684779562b758a9a7a18e9df0a0b907fef58b9a935651cdb46ad4d42f17cd5
                                          • Instruction Fuzzy Hash: 1541F271E042568FCB16CF68C8A469ABBB2FF85300F108529E446EB391EB74D847CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1fc94c956ac03c978fd0c65145c55f4104d4e713c8aac58836e4b5188ed458fe
                                          • Instruction ID: 2a2e8bfb7c0297d3ae1ead373dee730fcc51d94acb318ed41e3409e680673fa3
                                          • Opcode Fuzzy Hash: 1fc94c956ac03c978fd0c65145c55f4104d4e713c8aac58836e4b5188ed458fe
                                          • Instruction Fuzzy Hash: D53194B4E002069BDF318E69C48076EFBB3FB85310F64892AE459DB2C1D735D961DB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0293f859864fe19cbd5ac4ec5216fd328af9182834817d9051ccaa1a4847ca10
                                          • Instruction ID: dd83548a85678c066f2554846bb696f4856cff8e7c1440fcdb494b90a8450631
                                          • Opcode Fuzzy Hash: 0293f859864fe19cbd5ac4ec5216fd328af9182834817d9051ccaa1a4847ca10
                                          • Instruction Fuzzy Hash: A2319870A0030E9BCF29DF65D580A9EBBB6FF85304F104529D445AB394EB74E946CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: db9453ff0ac2b7834c13ad74efcff66c86f6e473c169ad314ed4304abb3550ef
                                          • Instruction ID: 2f301d567219e98c7e6d9549e741aa3993c4ea730cc2f1a5ceb3bf23127b532a
                                          • Opcode Fuzzy Hash: db9453ff0ac2b7834c13ad74efcff66c86f6e473c169ad314ed4304abb3550ef
                                          • Instruction Fuzzy Hash: BA319670A0030E8BCF2ADF65D580A9EBBB6FF85304F108529D445AB394EB74E946CB41
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 51cbb87ec89454629745baef4d4af838b32f718f9a892bd340260143535efc16
                                          • Instruction ID: 94c22c0de1138417788a0189713bf378e12a58c8ba639538bb3463468ab3a97a
                                          • Opcode Fuzzy Hash: 51cbb87ec89454629745baef4d4af838b32f718f9a892bd340260143535efc16
                                          • Instruction Fuzzy Hash: F3318C357100148FCB54DF78D498A9ABBF6FF89720F2180A9E506CB3A5CA71DC058B91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7e730f14b325d137dd5d752c94469ac0a0f3ec73f1dabc0bc30c28ec02daada
                                          • Instruction ID: 9f963ba0ce7b61b5d6b96896ba765f12c470b4927d553c0cfd5f2b9abf500c30
                                          • Opcode Fuzzy Hash: a7e730f14b325d137dd5d752c94469ac0a0f3ec73f1dabc0bc30c28ec02daada
                                          • Instruction Fuzzy Hash: 11313A71E0020A9BCB19CF65D8A469EB7B2FF89300F508529E806E7394DB70AC83CB51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5804f64111e72bab0b4435f02bd7b5c3ad3b86cf478c23cdc037c929640c2790
                                          • Instruction ID: d035938c7a8a3ab0b2ad7306b372371de254cdbecc8a597ae959bd9dc768b0ff
                                          • Opcode Fuzzy Hash: 5804f64111e72bab0b4435f02bd7b5c3ad3b86cf478c23cdc037c929640c2790
                                          • Instruction Fuzzy Hash: C2217C76A012569FCB11CF69D881AEEBBF5EB4C310F004066E915EB380D774DD42CBA1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 402923af6f10654d1f944c14d9db46a601af6bd1f2b10809973590e3a45185e2
                                          • Instruction ID: 86ce7f44929417cd7e39ebe5ebcf546d06692ed4a27f9d64dde1f6a447b72fde
                                          • Opcode Fuzzy Hash: 402923af6f10654d1f944c14d9db46a601af6bd1f2b10809973590e3a45185e2
                                          • Instruction Fuzzy Hash: 9C217AB5E012169FDF10CF69D880AAEBBF5EB48710F108069E915EB380E735DD02CB92
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3279243616.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_174d000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26832939416c529269fe84e1b5d734bfd6d69a0ee794e1e65b28f620107482b9
                                          • Instruction ID: 175f179db5c29df7946ce9ea7e4251dd39fdf9a83ae68ac71ae0348c49c6befd
                                          • Opcode Fuzzy Hash: 26832939416c529269fe84e1b5d734bfd6d69a0ee794e1e65b28f620107482b9
                                          • Instruction Fuzzy Hash: D9210771504204DFDB25CF68C9C4B26FBA5FB98314F20C5ADE9894B362C77AD446CA61
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6dc5467f01ebd14e28aa6fe914b9af427093bf37cf09dd6aa9a2575be81020a5
                                          • Instruction ID: fcae7535dcfd18635d6433151426a413065ef557f9136efc528f9416b837b963
                                          • Opcode Fuzzy Hash: 6dc5467f01ebd14e28aa6fe914b9af427093bf37cf09dd6aa9a2575be81020a5
                                          • Instruction Fuzzy Hash: 4A118235B000294BCB15D678C8146EE73BAEBC8311F014539D90AE7384DF76DC068BE1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 080f2680c685c576a7d731f2fd9179823892e0ab818e5fc7b643703be2485802
                                          • Instruction ID: 405fcb91c5b26475a80c063abfcde1630c773723b239d101a13b79e45810ec7c
                                          • Opcode Fuzzy Hash: 080f2680c685c576a7d731f2fd9179823892e0ab818e5fc7b643703be2485802
                                          • Instruction Fuzzy Hash: EC01D6717000020FDB5286ADE850B1AB7EBDFC9710F20843AE90AC7391EF25DC128791
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 43d063fdafd729c7b76b1d8fe0b02d6b45070fbd393fc9b5cfcec3a3d8d01be0
                                          • Instruction ID: dba28fdd931131f8b5b3cdfceaba64845af2d416fb13fbe9a7956c898c384473
                                          • Opcode Fuzzy Hash: 43d063fdafd729c7b76b1d8fe0b02d6b45070fbd393fc9b5cfcec3a3d8d01be0
                                          • Instruction Fuzzy Hash: A821E3B5C01259AFCB10DF9AD884ACEFFB8FB48310F10851AE518A7240D378A550CFA5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fea7f8fedc102f13eed2152e1d5dafa3222c682825d42f5c12a3b5aa643cddf7
                                          • Instruction ID: 4f73d079cc3fee8191d9d0f5871a9cf54333490ee561ee7be48f549fd071b3e1
                                          • Opcode Fuzzy Hash: fea7f8fedc102f13eed2152e1d5dafa3222c682825d42f5c12a3b5aa643cddf7
                                          • Instruction Fuzzy Hash: 8711C4317412154BD722DB2CE450B6E7BE6EF86214F108429E50ACB391DF25DD45C7A1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e439f536e882d1f68150c35e3eb292f07f62d2e9fd3e96b578f99b3d835e6524
                                          • Instruction ID: 02f1d753594c56c781b4a09ca93b57fc7db593e454a46791f6937759020d3b7c
                                          • Opcode Fuzzy Hash: e439f536e882d1f68150c35e3eb292f07f62d2e9fd3e96b578f99b3d835e6524
                                          • Instruction Fuzzy Hash: 7721C4B5D01259EFCB00DF9AD984ADEFBB4FB49310F10852AE918A7240D374A954CFE5
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3279243616.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_174d000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction ID: 46067f1de46d8cc3e4f51da34a3c8d8b78af4717b3bebb1efc30e1e81bb62963
                                          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction Fuzzy Hash: 6D11BB75504284CFDB22CF54C9C4B15FFA2FB88314F24C6ADD8894B262C33AD44ACB62
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 098b013355bebbadaa3ab678f5438a619fd171a6cda24e9a7cc5d06237246dca
                                          • Instruction ID: a12eac64b32a49b5401b8014454bf455e11d018c2cefac652028493e4fabe5b6
                                          • Opcode Fuzzy Hash: 098b013355bebbadaa3ab678f5438a619fd171a6cda24e9a7cc5d06237246dca
                                          • Instruction Fuzzy Hash: A401D432B000195BDB258669DC14AEF73BAEBC8701F014035D90AD7380EF65CC068BE2
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 265b87e22fced8ffad35d5f3ce7544cdbc4940ed951ba51485625b84daf1122c
                                          • Instruction ID: 8c0677a8d61084d7560bc29c0b642af51e9fa253e81c86716b3da0e152ffbbee
                                          • Opcode Fuzzy Hash: 265b87e22fced8ffad35d5f3ce7544cdbc4940ed951ba51485625b84daf1122c
                                          • Instruction Fuzzy Hash: AF01D6317000120BDB6595ADE454B2BF6EFDBC9714F20843AE90EC7390DF25DC028395
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0bd1664567ae66257e560351ac44160a933fb0c463f4cf45741eb7ec38e6d728
                                          • Instruction ID: de60e17d4a5a907b24202d7f870c854ec2b3be39abf98ff2421a527057fde44f
                                          • Opcode Fuzzy Hash: 0bd1664567ae66257e560351ac44160a933fb0c463f4cf45741eb7ec38e6d728
                                          • Instruction Fuzzy Hash: 310181317000125BDB26967DD854B2FA7EBEBC9615F24883AE10AC7384DE25DD038395
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0beedf087f6c73cca84785fdab81ac6e9c9f5c9f8f9871938e29c8061c93f8c4
                                          • Instruction ID: 4293d848cf2a792339c7d60c86c051f847da67767e8817d7fa00951223fc7fb5
                                          • Opcode Fuzzy Hash: 0beedf087f6c73cca84785fdab81ac6e9c9f5c9f8f9871938e29c8061c93f8c4
                                          • Instruction Fuzzy Hash: 680181317000165BDB26966DD854B2FB6EBEBC9625F10883AE50AC7380DE25DD038391
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 08450c2d97518b3bc992c1645605855a57b283e332c7c93b422724b60983bdcf
                                          • Instruction ID: d54e5a3a51840a6df6f09d99f70c0c4df9a39e1a3f2fde3b4d0095b41560b43f
                                          • Opcode Fuzzy Hash: 08450c2d97518b3bc992c1645605855a57b283e332c7c93b422724b60983bdcf
                                          • Instruction Fuzzy Hash: DE0181717001150BDB269B7DD854B2EB7EAEB8A711F108438E20ECB390DE26DC028791
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d2c66b135b4b26ae3b1267565c3031f03e8201278cc2980928c0775cfd59745
                                          • Instruction ID: 411e450a4d961fd6e760d8efa114d2bd5e592c5656454f064ead5da67c4a550e
                                          • Opcode Fuzzy Hash: 4d2c66b135b4b26ae3b1267565c3031f03e8201278cc2980928c0775cfd59745
                                          • Instruction Fuzzy Hash: 15E0D8F1A0560DABDB21CEB4C94679E7BBDE741204F3048A1E409CB181F276DA41C791
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-2843079600
                                          • Opcode ID: fae5556053bfabdec64d9c9274ee9743fe0235d583927d242b6b9ceec57c978d
                                          • Instruction ID: 9a4e159ed8fe6a042b68cadaac478b32f5606d17a1a071a2483f16aadac6160c
                                          • Opcode Fuzzy Hash: fae5556053bfabdec64d9c9274ee9743fe0235d583927d242b6b9ceec57c978d
                                          • Instruction Fuzzy Hash: 04125E70A0021ACFDB29DF69C994A9DB7F6FF88714F208969D409AB394DB349D45CF80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-1273862796
                                          • Opcode ID: 9a3385e7b48004210cde9abde07cfdfc730d666a76d2964d287f74fdaf224600
                                          • Instruction ID: ac14ee6b55d25ed7668e5384fd22eef3937d2bb1310806ddb9c64e5e00829d22
                                          • Opcode Fuzzy Hash: 9a3385e7b48004210cde9abde07cfdfc730d666a76d2964d287f74fdaf224600
                                          • Instruction Fuzzy Hash: 06915FB0A1020ADFDB29DF69DA94B6EB7B6EF84710F10C429E4019B3D4DB789D45CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-981061697
                                          • Opcode ID: 19a335605b5065ad1429c629f5e200867f630eec8d5866d2a106546dc66109ba
                                          • Instruction ID: 16236b815bfb97b24e9bdbe99f71b7296473ea28cfeb2a18f4d7ab3bfa937c4d
                                          • Opcode Fuzzy Hash: 19a335605b5065ad1429c629f5e200867f630eec8d5866d2a106546dc66109ba
                                          • Instruction Fuzzy Hash: B1F14F70A01209DFDB19EF65D594A6EB7BAFF88300F208568D4059B3E8CB35EC46CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-3723351465
                                          • Opcode ID: 0cc6c89fa93656d07ea045df454ccf191e2de4f21a0f586aedf28914a845f10e
                                          • Instruction ID: 470d708dd1a3359440ee5819427264873ea5dcef3afe8e56dc773c3ce52fd7d0
                                          • Opcode Fuzzy Hash: 0cc6c89fa93656d07ea045df454ccf191e2de4f21a0f586aedf28914a845f10e
                                          • Instruction Fuzzy Hash: 9E71C0B0A0420A8FDB29CFA8D9406ADB7FAFF85700F208429D406EB284DB75DD45CBD1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: fcabfc8303c404267d207b4ce91aad5a7012be96b8df07fd9986a20ea709569e
                                          • Instruction ID: 681aba4949759d3633a7d458dd9d9cf6e58ee85c15f0d5850a2431ef37a884e6
                                          • Opcode Fuzzy Hash: fcabfc8303c404267d207b4ce91aad5a7012be96b8df07fd9986a20ea709569e
                                          • Instruction Fuzzy Hash: 0AB17170A00209CFCB29DFA9D99866EB7B6FF84314F248429D406DB394DB74DC86CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR]q$LR]q$$]q$$]q
                                          • API String ID: 0-3527005858
                                          • Opcode ID: 256514a6b90eea0df5b92c9495570c45199d23ff42cce4e3c17f3b7fe61c1ab5
                                          • Instruction ID: e40207c34e12bdd2d6059d56287f608d3dbf6bef40769f1c82e6993a32778d71
                                          • Opcode Fuzzy Hash: 256514a6b90eea0df5b92c9495570c45199d23ff42cce4e3c17f3b7fe61c1ab5
                                          • Instruction Fuzzy Hash: EA51BE70B002029FCB29DB29D999A6EB7FAFF88304F148569D4069B3E5DB34EC01CB51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.3303206784.0000000007170000.00000040.00000800.00020000.00000000.sdmp, Offset: 07170000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_7170000_z17invoice.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: 84b81b3f2f8ce9326bb42276097d3f4479319a5e971b7d869ea5cceb7deb8a79
                                          • Instruction ID: 0d44350ad37c2f0cd5be69520c8bd42a667bd3ae57eb8fe183ac33a140b38cfd
                                          • Opcode Fuzzy Hash: 84b81b3f2f8ce9326bb42276097d3f4479319a5e971b7d869ea5cceb7deb8a79
                                          • Instruction Fuzzy Hash: A9518370A102069FCF2ADB6CE8806ADB7BAFF89311F14C529D405A7394DB35DC41CB51

                                          Execution Graph

                                          Execution Coverage:8.8%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:197
                                          Total number of Limit Nodes:15
                                          execution_graph 26612 8082948 26613 8082963 26612->26613 26615 80823ec 26612->26615 26616 80823f7 26615->26616 26618 80829e5 26616->26618 26619 80823fc 26616->26619 26618->26613 26621 8082407 26619->26621 26620 8082caf 26620->26618 26621->26620 26624 8082ee8 26621->26624 26628 8082ef8 26621->26628 26625 8082ee6 26624->26625 26625->26624 26633 8082444 FindCloseChangeNotification 26625->26633 26627 8082f21 26627->26620 26629 8082f25 26628->26629 26630 8082f06 26628->26630 26634 8082444 FindCloseChangeNotification 26630->26634 26632 8082f21 26632->26620 26633->26627 26634->26632 26741 80836d8 26742 8083700 26741->26742 26743 80836f6 26741->26743 26745 808372b 26743->26745 26746 808373d 26745->26746 26749 808376c 26746->26749 26750 8083090 26746->26750 26749->26742 26751 8083478 FindCloseChangeNotification 26750->26751 26752 80834df 26751->26752 26752->26742 26763 8080ee8 26764 8081073 26763->26764 26765 8080f0e 26763->26765 26765->26764 26768 8081168 PostMessageW 26765->26768 26770 8081162 26765->26770 26769 80811d4 26768->26769 26769->26765 26771 8081168 PostMessageW 26770->26771 26772 80811d4 26771->26772 26772->26765 26635 d3d690 DuplicateHandle 26636 d3d726 26635->26636 26753 d3d040 26754 d3d086 GetCurrentProcess 26753->26754 26756 d3d0d1 26754->26756 26757 d3d0d8 GetCurrentThread 26754->26757 26756->26757 26758 d3d115 GetCurrentProcess 26757->26758 26759 d3d10e 26757->26759 26760 d3d14b 26758->26760 26759->26758 26761 d3d173 GetCurrentThreadId 26760->26761 26762 d3d1a4 26761->26762 26773 d34668 26774 d3467f 26773->26774 26775 d3468b 26774->26775 26779 d34781 26774->26779 26784 d33e40 26775->26784 26777 d346aa 26780 d347a5 26779->26780 26788 d34881 26780->26788 26792 d34890 26780->26792 26785 d33e4b 26784->26785 26800 d35c54 26785->26800 26787 d37050 26787->26777 26790 d348b7 26788->26790 26789 d34994 26789->26789 26790->26789 26796 d344c4 26790->26796 26794 d348b7 26792->26794 26793 d34994 26793->26793 26794->26793 26795 d344c4 CreateActCtxA 26794->26795 26795->26793 26797 d35920 CreateActCtxA 26796->26797 26799 d359e3 26797->26799 26801 d35c5f 26800->26801 26804 d35c74 26801->26804 26803 d370f5 26803->26787 26805 d35c7f 26804->26805 26808 d35ca4 26805->26808 26807 d371da 26807->26803 26809 d35caf 26808->26809 26812 d35cd4 26809->26812 26811 d372cd 26811->26807 26813 d35cdf 26812->26813 26815 d385cb 26813->26815 26818 d3ac79 26813->26818 26814 d38609 26814->26811 26815->26814 26822 d3cd68 26815->26822 26826 d3acb0 26818->26826 26830 d3aca0 26818->26830 26819 d3ac8e 26819->26815 26823 d3cd99 26822->26823 26824 d3cdbd 26823->26824 26863 d3cf28 26823->26863 26824->26814 26835 d3ad97 26826->26835 26843 d3ada8 26826->26843 26827 d3acbf 26827->26819 26831 d3acb0 26830->26831 26833 d3ad97 2 API calls 26831->26833 26834 d3ada8 2 API calls 26831->26834 26832 d3acbf 26832->26819 26833->26832 26834->26832 26836 d3adb9 26835->26836 26837 d3addc 26835->26837 26836->26837 26851 d3b031 26836->26851 26855 d3b040 26836->26855 26837->26827 26838 d3afe0 GetModuleHandleW 26840 d3b00d 26838->26840 26839 d3add4 26839->26837 26839->26838 26840->26827 26844 d3adb9 26843->26844 26845 d3addc 26843->26845 26844->26845 26849 d3b031 LoadLibraryExW 26844->26849 26850 d3b040 LoadLibraryExW 26844->26850 26845->26827 26846 d3add4 26846->26845 26847 d3afe0 GetModuleHandleW 26846->26847 26848 d3b00d 26847->26848 26848->26827 26849->26846 26850->26846 26852 d3b054 26851->26852 26853 d3b079 26852->26853 26859 d3a130 26852->26859 26853->26839 26856 d3b054 26855->26856 26857 d3a130 LoadLibraryExW 26856->26857 26858 d3b079 26856->26858 26857->26858 26858->26839 26860 d3b220 LoadLibraryExW 26859->26860 26862 d3b299 26860->26862 26862->26853 26865 d3cf35 26863->26865 26864 d3cf6f 26864->26824 26865->26864 26867 d3bae0 26865->26867 26868 d3bae5 26867->26868 26870 d3dc88 26868->26870 26871 d3d2dc 26868->26871 26872 d3d2e7 26871->26872 26873 d35cd4 3 API calls 26872->26873 26874 d3dcf7 26873->26874 26874->26870 26637 6aefa20 26638 6aefa3a 26637->26638 26648 6aefa42 26638->26648 26652 80801a8 26638->26652 26656 80805c8 26638->26656 26669 80801b7 26638->26669 26673 8080236 26638->26673 26676 8080613 26638->26676 26680 808037e 26638->26680 26693 8080384 26638->26693 26697 8080483 26638->26697 26701 8080283 26638->26701 26705 8080440 26638->26705 26708 80804cb 26638->26708 26714 808012b 26638->26714 26653 8080a7c 26652->26653 26717 6aee2d0 26653->26717 26657 80805d5 26656->26657 26725 6aee1e0 26657->26725 26658 8080b11 26660 80801c9 26661 8080a0d 26660->26661 26721 6aedf98 26660->26721 26661->26648 26662 8080a42 26662->26648 26664 80803f5 26664->26662 26729 6aee048 26664->26729 26670 80801c9 26669->26670 26672 6aedf98 ResumeThread 26670->26672 26671 8080643 26671->26648 26672->26671 26675 6aee1e0 WriteProcessMemory 26673->26675 26674 8080264 26674->26648 26675->26674 26677 8080619 26676->26677 26679 6aedf98 ResumeThread 26677->26679 26678 8080643 26678->26648 26679->26678 26681 80806da 26680->26681 26691 6aee1e0 WriteProcessMemory 26681->26691 26682 8080b11 26683 8080180 26683->26682 26684 80801c9 26683->26684 26686 80803f5 26683->26686 26685 8080a0d 26684->26685 26690 6aedf98 ResumeThread 26684->26690 26685->26648 26687 8080a42 26686->26687 26692 6aee048 Wow64SetThreadContext 26686->26692 26687->26648 26688 8080643 26688->26648 26689 80809c1 26689->26648 26690->26688 26691->26683 26692->26689 26694 80803ad 26693->26694 26733 6aee120 26694->26733 26698 8080489 26697->26698 26700 6aedf98 ResumeThread 26698->26700 26699 8080643 26699->26648 26700->26699 26702 8080290 26701->26702 26704 6aee120 VirtualAllocEx 26702->26704 26703 808092b 26704->26703 26707 6aee1e0 WriteProcessMemory 26705->26707 26706 8080464 26706->26648 26707->26706 26713 6aee048 Wow64SetThreadContext 26708->26713 26709 808049a 26710 8080b37 26709->26710 26712 6aedf98 ResumeThread 26709->26712 26711 8080643 26711->26648 26712->26711 26713->26709 26737 6aee468 26714->26737 26718 6aee31b ReadProcessMemory 26717->26718 26720 6aee35f 26718->26720 26722 6aedfd8 ResumeThread 26721->26722 26724 6aee009 26722->26724 26724->26648 26726 6aee228 WriteProcessMemory 26725->26726 26728 6aee27f 26726->26728 26728->26658 26728->26660 26728->26664 26730 6aee08d Wow64SetThreadContext 26729->26730 26732 6aee0d5 26730->26732 26732->26648 26734 6aee160 VirtualAllocEx 26733->26734 26736 6aee19d 26734->26736 26738 6aee4f1 CreateProcessA 26737->26738 26740 6aee6b3 26738->26740

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 d3d031-d3d0cf GetCurrentProcess 299 d3d0d1-d3d0d7 294->299 300 d3d0d8-d3d10c GetCurrentThread 294->300 299->300 301 d3d115-d3d149 GetCurrentProcess 300->301 302 d3d10e-d3d114 300->302 304 d3d152-d3d16d call d3d618 301->304 305 d3d14b-d3d151 301->305 302->301 308 d3d173-d3d1a2 GetCurrentThreadId 304->308 305->304 309 d3d1a4-d3d1aa 308->309 310 d3d1ab-d3d20d 308->310 309->310
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00D3D0BE
                                          • GetCurrentThread.KERNEL32 ref: 00D3D0FB
                                          • GetCurrentProcess.KERNEL32 ref: 00D3D138
                                          • GetCurrentThreadId.KERNEL32 ref: 00D3D191
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 03ff784a576e65da09ff55476a9e36bfc615f8c55deb2d1f31ae4f998cea439f
                                          • Instruction ID: f44e7991a0e1b86690c007f4f530f056fe268d2469e32761b73c6c015501126b
                                          • Opcode Fuzzy Hash: 03ff784a576e65da09ff55476a9e36bfc615f8c55deb2d1f31ae4f998cea439f
                                          • Instruction Fuzzy Hash: DB5178B09013498FDB14DFA9D948BAEBBF2EF88304F248459E409A73A1C7795984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 317 d3d040-d3d0cf GetCurrentProcess 321 d3d0d1-d3d0d7 317->321 322 d3d0d8-d3d10c GetCurrentThread 317->322 321->322 323 d3d115-d3d149 GetCurrentProcess 322->323 324 d3d10e-d3d114 322->324 326 d3d152-d3d16d call d3d618 323->326 327 d3d14b-d3d151 323->327 324->323 330 d3d173-d3d1a2 GetCurrentThreadId 326->330 327->326 331 d3d1a4-d3d1aa 330->331 332 d3d1ab-d3d20d 330->332 331->332
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00D3D0BE
                                          • GetCurrentThread.KERNEL32 ref: 00D3D0FB
                                          • GetCurrentProcess.KERNEL32 ref: 00D3D138
                                          • GetCurrentThreadId.KERNEL32 ref: 00D3D191
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 46ceb8cc717934d56b1c9d64f917b5e3b167e974e9e9383dbea374e98c5c36ce
                                          • Instruction ID: 63da5fd85eeb9be28a2a78832b41c4c7846bd106c23a275a84f51f8d54d9dc65
                                          • Opcode Fuzzy Hash: 46ceb8cc717934d56b1c9d64f917b5e3b167e974e9e9383dbea374e98c5c36ce
                                          • Instruction Fuzzy Hash: 35516AB09013498FDB14DFA9D948BAEBBF2FF48304F248559D409A7350D7785984CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 370 6aee468-6aee4fd 372 6aee4ff-6aee509 370->372 373 6aee536-6aee556 370->373 372->373 374 6aee50b-6aee50d 372->374 380 6aee58f-6aee5be 373->380 381 6aee558-6aee562 373->381 375 6aee50f-6aee519 374->375 376 6aee530-6aee533 374->376 378 6aee51d-6aee52c 375->378 379 6aee51b 375->379 376->373 378->378 382 6aee52e 378->382 379->378 387 6aee5f7-6aee6b1 CreateProcessA 380->387 388 6aee5c0-6aee5ca 380->388 381->380 383 6aee564-6aee566 381->383 382->376 385 6aee568-6aee572 383->385 386 6aee589-6aee58c 383->386 389 6aee576-6aee585 385->389 390 6aee574 385->390 386->380 401 6aee6ba-6aee740 387->401 402 6aee6b3-6aee6b9 387->402 388->387 391 6aee5cc-6aee5ce 388->391 389->389 392 6aee587 389->392 390->389 393 6aee5d0-6aee5da 391->393 394 6aee5f1-6aee5f4 391->394 392->386 396 6aee5de-6aee5ed 393->396 397 6aee5dc 393->397 394->387 396->396 398 6aee5ef 396->398 397->396 398->394 412 6aee742-6aee746 401->412 413 6aee750-6aee754 401->413 402->401 412->413 414 6aee748 412->414 415 6aee756-6aee75a 413->415 416 6aee764-6aee768 413->416 414->413 415->416 417 6aee75c 415->417 418 6aee76a-6aee76e 416->418 419 6aee778-6aee77c 416->419 417->416 418->419 422 6aee770 418->422 420 6aee78e-6aee795 419->420 421 6aee77e-6aee784 419->421 423 6aee7ac 420->423 424 6aee797-6aee7a6 420->424 421->420 422->419 424->423
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06AEE69E
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2190794068.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6ae0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 4e711b3c53f648255e6ca30a20a9a39f2655a4146ba8af3d9a3fe8b798de7bbe
                                          • Instruction ID: 94bc8187844e9ecbdd86014db81059554a9885e4e871204395a78faf8a4989c5
                                          • Opcode Fuzzy Hash: 4e711b3c53f648255e6ca30a20a9a39f2655a4146ba8af3d9a3fe8b798de7bbe
                                          • Instruction Fuzzy Hash: 7E916C71D00219CFDB64DF68C841BEDBBB2FF48314F1485AAE819A7250EB749985CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 426 d3ada8-d3adb7 427 d3ade3-d3ade7 426->427 428 d3adb9-d3adc6 call d3a0cc 426->428 430 d3adfb-d3ae3c 427->430 431 d3ade9-d3adf3 427->431 434 d3adc8 428->434 435 d3addc 428->435 437 d3ae49-d3ae57 430->437 438 d3ae3e-d3ae46 430->438 431->430 482 d3adce call d3b031 434->482 483 d3adce call d3b040 434->483 435->427 439 d3ae7b-d3ae7d 437->439 440 d3ae59-d3ae5e 437->440 438->437 442 d3ae80-d3ae87 439->442 443 d3ae60-d3ae67 call d3a0d8 440->443 444 d3ae69 440->444 441 d3add4-d3add6 441->435 445 d3af18-d3afd8 441->445 448 d3ae94-d3ae9b 442->448 449 d3ae89-d3ae91 442->449 446 d3ae6b-d3ae79 443->446 444->446 477 d3afe0-d3b00b GetModuleHandleW 445->477 478 d3afda-d3afdd 445->478 446->442 452 d3aea8-d3aeaa call d3a0e8 448->452 453 d3ae9d-d3aea5 448->453 449->448 455 d3aeaf-d3aeb1 452->455 453->452 457 d3aeb3-d3aebb 455->457 458 d3aebe-d3aec3 455->458 457->458 459 d3aee1-d3aeee 458->459 460 d3aec5-d3aecc 458->460 467 d3af11-d3af17 459->467 468 d3aef0-d3af0e 459->468 460->459 462 d3aece-d3aede call d3a0f8 call d3a108 460->462 462->459 468->467 479 d3b014-d3b028 477->479 480 d3b00d-d3b013 477->480 478->477 480->479 482->441 483->441
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00D3AFFE
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 6691dee54efcbd5e10a598724c7e80acbaf5521d18a97e58af6e2729e58d87d1
                                          • Instruction ID: b5ebb0fe196e669337e4ea67379c5e57c9b45d8cbc050dedc80d31630648625d
                                          • Opcode Fuzzy Hash: 6691dee54efcbd5e10a598724c7e80acbaf5521d18a97e58af6e2729e58d87d1
                                          • Instruction Fuzzy Hash: 5D714670A00B058FD724DF69D445B5ABBF5FF88700F048A2EE48AD7A50D775E849CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 484 d344c4-d359e1 CreateActCtxA 487 d359e3-d359e9 484->487 488 d359ea-d35a44 484->488 487->488 495 d35a53-d35a57 488->495 496 d35a46-d35a49 488->496 497 d35a59-d35a65 495->497 498 d35a68 495->498 496->495 497->498 500 d35a69 498->500 500->500
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00D359D1
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: fe0ef443f4be48d6ce08d3ebe262197740d8e563c36fbed87c9b33fa852bbc0e
                                          • Instruction ID: 62eff22d8fe3e75d299b2e75b63f7d9f34440cc1b711b5a0c024e99a63871e3a
                                          • Opcode Fuzzy Hash: fe0ef443f4be48d6ce08d3ebe262197740d8e563c36fbed87c9b33fa852bbc0e
                                          • Instruction Fuzzy Hash: 3341F0B0C0061DCBDB24DFA9C844B9EBBF5FF48304F20816AD408AB255DB756946CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 501 d35914-d359e1 CreateActCtxA 503 d359e3-d359e9 501->503 504 d359ea-d35a44 501->504 503->504 511 d35a53-d35a57 504->511 512 d35a46-d35a49 504->512 513 d35a59-d35a65 511->513 514 d35a68 511->514 512->511 513->514 516 d35a69 514->516 516->516
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00D359D1
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 14eeadcd3cab20885d9afe830e28c8026868a82fa2b2896ea3cb0042bc727a70
                                          • Instruction ID: ba17d97fe627b140cf9c8ab19ea309cb00104e988b84407dea2ce285b9bf4d53
                                          • Opcode Fuzzy Hash: 14eeadcd3cab20885d9afe830e28c8026868a82fa2b2896ea3cb0042bc727a70
                                          • Instruction Fuzzy Hash: A04112B0C00619CBDB24DFA9C884BCEBBF6BF48304F24815AD409AB255DB756946CF60

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 517 6aee1e0-6aee22e 519 6aee23e-6aee27d WriteProcessMemory 517->519 520 6aee230-6aee23c 517->520 522 6aee27f-6aee285 519->522 523 6aee286-6aee2b6 519->523 520->519 522->523
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06AEE270
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2190794068.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6ae0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 0bf4386e50c5272cdf39f3167c603c1e8d6e3d0d518bb6a62f8fa7ed3e62f92f
                                          • Instruction ID: 97217083fcc96ad9f325a4a9ca547d49afec008f4469e5d579663fa73f56385e
                                          • Opcode Fuzzy Hash: 0bf4386e50c5272cdf39f3167c603c1e8d6e3d0d518bb6a62f8fa7ed3e62f92f
                                          • Instruction Fuzzy Hash: 372124B19003499FCF10DFAAC885BEEBBF5FF48310F50842AE919A7240C7789945CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 527 d3d689-d3d68e 528 d3d690-d3d724 DuplicateHandle 527->528 529 d3d726-d3d72c 528->529 530 d3d72d-d3d74a 528->530 529->530
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D3D717
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 2a0a2d27cb91d022cf3aed939f0c002c066ee745981c9466e35f23276a0c483d
                                          • Instruction ID: 6e52b1c99d55b5513b47da4582c198547b9fc3336c085c83172f348537353484
                                          • Opcode Fuzzy Hash: 2a0a2d27cb91d022cf3aed939f0c002c066ee745981c9466e35f23276a0c483d
                                          • Instruction Fuzzy Hash: E921E5B59002499FDB10CFAAD584ADEBBF5EB48714F14801AE914A7351C378A940CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 543 6aee2d0-6aee35d ReadProcessMemory 546 6aee35f-6aee365 543->546 547 6aee366-6aee396 543->547 546->547
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06AEE350
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2190794068.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6ae0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 756c59ec039a01b8c9914579358b6278a1bd8f195e7374e9f767a9f7b7e8779d
                                          • Instruction ID: 72dd909677ad10fd6e441560814824b4abf5ba1b7f42ab791d55cb9a2359ef96
                                          • Opcode Fuzzy Hash: 756c59ec039a01b8c9914579358b6278a1bd8f195e7374e9f767a9f7b7e8779d
                                          • Instruction Fuzzy Hash: 7A2107B1C003599FCB10DFAAC885AEEFBF5FF48310F50842AE519A7250C7799945CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 533 6aee048-6aee093 535 6aee095-6aee0a1 533->535 536 6aee0a3-6aee0d3 Wow64SetThreadContext 533->536 535->536 538 6aee0dc-6aee10c 536->538 539 6aee0d5-6aee0db 536->539 539->538
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06AEE0C6
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2190794068.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6ae0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 709223ee8458bd40a6df72e1c17110dd9323477aec69fad91a0a5303525bae26
                                          • Instruction ID: a2f0db9767b80eca76a2adaa0a89839c87048d8a9a164771339ba077a037c219
                                          • Opcode Fuzzy Hash: 709223ee8458bd40a6df72e1c17110dd9323477aec69fad91a0a5303525bae26
                                          • Instruction Fuzzy Hash: 7A2134B1D002098FDB10DFAAC485BAEBBF5FF88310F50842AD519A7241CB78A945CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 551 d3d690-d3d724 DuplicateHandle 552 d3d726-d3d72c 551->552 553 d3d72d-d3d74a 551->553 552->553
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00D3D717
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: d75b9f16b8c23168be3efcfed0f36efe3aaf63fb7bcbbf11fee8c361f07509f6
                                          • Instruction ID: 577819806ac14bca7efd0a19110919f0f9df09e27311ca2a3986ed3fc7bf7b6e
                                          • Opcode Fuzzy Hash: d75b9f16b8c23168be3efcfed0f36efe3aaf63fb7bcbbf11fee8c361f07509f6
                                          • Instruction Fuzzy Hash: FC21E2B59002489FDB10CFAAD984ADEFBF9FF48310F14801AE918A3310C378A940CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 556 d3a130-d3b260 558 d3b262-d3b265 556->558 559 d3b268-d3b297 LoadLibraryExW 556->559 558->559 560 d3b2a0-d3b2bd 559->560 561 d3b299-d3b29f 559->561 561->560
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D3B079,00000800,00000000,00000000), ref: 00D3B28A
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: cd15a47f46d2a0d81e4064437505bb3a76c4e816b08e09567768a0d265296192
                                          • Instruction ID: c82c6faa7e5429ea10ea1e6375590dbd688aed9abcda293400922b8600585dda
                                          • Opcode Fuzzy Hash: cd15a47f46d2a0d81e4064437505bb3a76c4e816b08e09567768a0d265296192
                                          • Instruction Fuzzy Hash: B31114B68003099FCB10DF9AC444ADFFBF5EB48720F14852ED919A7210C379A945CFA9
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D3B079,00000800,00000000,00000000), ref: 00D3B28A
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 37edbd76db72b74f49cb08cf52832027c63c493f9b34295967d6ae6fb58d8dbb
                                          • Instruction ID: 993917c6dae96dfc2564b903859dd4e9ac29a0d234327aec0c79c9ae9089137f
                                          • Opcode Fuzzy Hash: 37edbd76db72b74f49cb08cf52832027c63c493f9b34295967d6ae6fb58d8dbb
                                          • Instruction Fuzzy Hash: F51114B68002498FCB10DFAAC444ADEFBF5EF88720F14852ED519A7200C779A546CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06AEE18E
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2190794068.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6ae0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 60feeed3fd49efd4b2d48431b42f296e9655cc18624539083ba67d5d07c4575b
                                          • Instruction ID: 0e77733fa1d3f817769de33f8d5b688175909305b346e67d88e44d2f0b10201e
                                          • Opcode Fuzzy Hash: 60feeed3fd49efd4b2d48431b42f296e9655cc18624539083ba67d5d07c4575b
                                          • Instruction Fuzzy Hash: 3C1137B18002499FCB10DFAAC844AEEFFF5FF48710F108819E519A7250CB79A940CFA1
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,08082F21,?,?), ref: 080834D0
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2191096641.0000000008080000.00000040.00000800.00020000.00000000.sdmp, Offset: 08080000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_8080000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: 593bd53a4cb0a11fa195e26ff8f9270f269f113546b5b9eddbb4705cffdf0956
                                          • Instruction ID: 1081350bcab31e5631c8052d2e6f46beca353b9081b4f0061d23580f29e14948
                                          • Opcode Fuzzy Hash: 593bd53a4cb0a11fa195e26ff8f9270f269f113546b5b9eddbb4705cffdf0956
                                          • Instruction Fuzzy Hash: 591143B2800208CFCB20EF9AC444BAEBBF5EF48720F108419D558A7341C338A984CFA5
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,08082F21,?,?), ref: 080834D0
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2191096641.0000000008080000.00000040.00000800.00020000.00000000.sdmp, Offset: 08080000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_8080000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: 2affba4e0c25d12b1847d2c454a8d4cd7152cb03ec84a0aa1e6f58e744aaa777
                                          • Instruction ID: 54a6c144a181d041e59e8b8aeab1a34ed8d2179a3a414dbcacb83648edcc9c84
                                          • Opcode Fuzzy Hash: 2affba4e0c25d12b1847d2c454a8d4cd7152cb03ec84a0aa1e6f58e744aaa777
                                          • Instruction Fuzzy Hash: 7C1143B2800209CFCB20EF9AC444BAEBBF5EF88720F108419D558A7341D338A984CFA5
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,08082F21,?,?), ref: 080834D0
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2191096641.0000000008080000.00000040.00000800.00020000.00000000.sdmp, Offset: 08080000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_8080000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: df4c2d8ad99a7dd635dea38465fc4ff80711bda2c9ce8877258439b245570a5c
                                          • Instruction ID: 8f9bd874c6e218ead064c08896e93a1e2f4cf9b954bae7bcd477c167449ab64b
                                          • Opcode Fuzzy Hash: df4c2d8ad99a7dd635dea38465fc4ff80711bda2c9ce8877258439b245570a5c
                                          • Instruction Fuzzy Hash: FC1146B1800348CFCB20EF99C445BAEBBF5EB48720F108459D558A7340D339A584CFA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2190794068.0000000006AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AE0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_6ae0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 035a4ef470e7df0bd0377202a96c41d5515f087229151d985e402520d673ba78
                                          • Instruction ID: 9af4f65a2a1b81ded4db15898343d66f9aa5970a6e7ba4ddc193aa2a33d68f29
                                          • Opcode Fuzzy Hash: 035a4ef470e7df0bd0377202a96c41d5515f087229151d985e402520d673ba78
                                          • Instruction Fuzzy Hash: 6C1128B1D002488BCB20EFAAC4457AEFBF5EF88714F208419D519A7240CB79A545CBA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00D3AFFE
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185353728.0000000000D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_d30000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: aef1fee617b85d6b73a1b6c8164c22bfe0dca9b8aee3dee2d2b32cdc545bb332
                                          • Instruction ID: 66a0ed5d20db5e4fb0f4540407b6c712fdb03cd0eb24a821dfca5e55adb08cf8
                                          • Opcode Fuzzy Hash: aef1fee617b85d6b73a1b6c8164c22bfe0dca9b8aee3dee2d2b32cdc545bb332
                                          • Instruction Fuzzy Hash: 271110B5C003498FCB14DF9AC444ADEFBF5EF88724F14841AD528A7210C379A545CFA1
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,08082F21,?,?), ref: 080834D0
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2191096641.0000000008080000.00000040.00000800.00020000.00000000.sdmp, Offset: 08080000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_8080000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: 5430da49393e7042a52ad1af8c49fc3e2768d23a4537294d2561ef98dd9ee0ad
                                          • Instruction ID: c13ed998f4dbdd20dc58d9c025625e937ad08289fd8a15dfc24beb3021634011
                                          • Opcode Fuzzy Hash: 5430da49393e7042a52ad1af8c49fc3e2768d23a4537294d2561ef98dd9ee0ad
                                          • Instruction Fuzzy Hash: 371103B6800249CFCB20DF99C544BEEBBF5EF88720F10845AD558A7340C739A584CFA5
                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 080811C5
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2191096641.0000000008080000.00000040.00000800.00020000.00000000.sdmp, Offset: 08080000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_8080000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 2ca1bf06ee31f42155549faa719857553a66458d9a7b85d69f0579c459117923
                                          • Instruction ID: 5960db60e26a885d0742a2ebd96b1dc37416b6e6ad271b8f75e7b79b6ef0c454
                                          • Opcode Fuzzy Hash: 2ca1bf06ee31f42155549faa719857553a66458d9a7b85d69f0579c459117923
                                          • Instruction Fuzzy Hash: FA11F2B58003499FDB10DF9AC844BDEFBF8EB49710F108419E559A7600C379A584CFA1
                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 080811C5
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2191096641.0000000008080000.00000040.00000800.00020000.00000000.sdmp, Offset: 08080000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_8080000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 685462dc6a6b440b244107be292eb028ad3dbb5100c8b76eb7279dc4e6238adf
                                          • Instruction ID: 303b7d42dd8bfd00275a0d5a4af01033abb0e64ee81306148fc6bce604e632db
                                          • Opcode Fuzzy Hash: 685462dc6a6b440b244107be292eb028ad3dbb5100c8b76eb7279dc4e6238adf
                                          • Instruction Fuzzy Hash: 1711C2B58003499FDB10DF9AD845BDEBBF8EB49710F108419D558A7600C379A584CFA5
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2184840820.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_b2d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4fac6b9daaa73e42d563de04c4517884c99e0e34fc192bedbffc3631e4f84d95
                                          • Instruction ID: de9e1208a5197c8173b9fe51ec6dc3f5326932ebc202980e9c642aa2e4d9647a
                                          • Opcode Fuzzy Hash: 4fac6b9daaa73e42d563de04c4517884c99e0e34fc192bedbffc3631e4f84d95
                                          • Instruction Fuzzy Hash: 3221D072504244DFDB05DF54E9C4B2ABFA5FB88310F24C6A9E9090B256C33AD816DBA2
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2184840820.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_b2d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8c982ccb79c349ac1f934d5f2221587b493cded8649e667d1b1b5ecc72ba1840
                                          • Instruction ID: 2ea81ee94214fd41fcc019d068e5f582330b259c6d5afb03460e1319bafa01a4
                                          • Opcode Fuzzy Hash: 8c982ccb79c349ac1f934d5f2221587b493cded8649e667d1b1b5ecc72ba1840
                                          • Instruction Fuzzy Hash: 91210071504240DFDB05DF14E9C0F26BFA5FBA8318F20C5A9E9090B256C37AD856DAA2
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185000987.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_c4d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a492212aad7702b3d62fe94cf12db0ee2dea01bad71dc3f9305477df505ad916
                                          • Instruction ID: 1e9bbb175b915a3951bc523d1ed6effc6b0eb3c3dbac706e0ecda06babf17d28
                                          • Opcode Fuzzy Hash: a492212aad7702b3d62fe94cf12db0ee2dea01bad71dc3f9305477df505ad916
                                          • Instruction Fuzzy Hash: 65210771604204DFDB15EF14D5C0F26BBA5FB84314F20C6ADE90A4B356C3BADC46CA61
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185000987.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_c4d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1cf2bf974e96b60e81e568d959c03dae0e877d5ca76db5dca38b3295072d4dca
                                          • Instruction ID: 398ac899c017a30acb466511c6c3a098c96000bda043356d2fe0f93e3d0baa32
                                          • Opcode Fuzzy Hash: 1cf2bf974e96b60e81e568d959c03dae0e877d5ca76db5dca38b3295072d4dca
                                          • Instruction Fuzzy Hash: 2621F271604204DFCB14EF24D9C4B26BF65FB88314F20C5ADE90A4B396C33AD807CA62
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185000987.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_c4d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1d2347db983d0358d218332e93c8b3f4ada9b4d6f30794ebeaffd5d9303e8d92
                                          • Instruction ID: d2cf42a773e9eca5b6db2191da05cd10523f1bd35548061617092bad6cbbb160
                                          • Opcode Fuzzy Hash: 1d2347db983d0358d218332e93c8b3f4ada9b4d6f30794ebeaffd5d9303e8d92
                                          • Instruction Fuzzy Hash: 73218E755093808FCB02DF24D994715BF71FB46314F28C5EAD8898B2A7C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2184840820.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_b2d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                                          • Instruction ID: 591b585598dac16c18aa2a22db6c059d62f8d053fe24cd725d37597e3bd311a0
                                          • Opcode Fuzzy Hash: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                                          • Instruction Fuzzy Hash: A821B176504240DFDB06CF50D9C4B56BFB2FB88314F24C6A9DD490B656C33AD82ACBA2
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2184840820.0000000000B2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B2D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_b2d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                          • Instruction ID: e9ba30bb55ffb134a12ba0a6c511fb40463a9d2d42f309567a755007f066ab1f
                                          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                          • Instruction Fuzzy Hash: 02112672504280CFCB02CF10D5C4B16BFB1FBA8314F24C6E9D8490B256C33AD85ACBA2
                                          Memory Dump Source
                                          • Source File: 00000007.00000002.2185000987.0000000000C4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C4D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_7_2_c4d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction ID: 2c766823859d713cfbfe78261b910b97cd59c9f290d1c0965768f5aec328e173
                                          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction Fuzzy Hash: E911BB75904280DFCB12DF10C5C4B15BBA1FB84314F24C6A9D84A4B296C37AD84ACB62

                                          Execution Graph

                                          Execution Coverage:10.9%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:157
                                          Total number of Limit Nodes:12
                                          execution_graph 40566 3080848 40568 308084e 40566->40568 40567 308091b 40568->40567 40572 308138f 40568->40572 40576 6e11f88 40568->40576 40580 6e11f78 40568->40580 40574 3081393 40572->40574 40573 30814ba 40573->40568 40574->40573 40584 3088258 40574->40584 40577 6e11f97 40576->40577 40597 6e117c4 40577->40597 40581 6e11f97 40580->40581 40582 6e117c4 4 API calls 40581->40582 40583 6e11fb8 40582->40583 40583->40568 40585 3088262 40584->40585 40586 308827c 40585->40586 40589 6e2fa30 40585->40589 40593 6e2fa1f 40585->40593 40586->40574 40591 6e2fa45 40589->40591 40590 6e2fc5a 40590->40586 40591->40590 40592 6e2fc70 GlobalMemoryStatusEx GlobalMemoryStatusEx 40591->40592 40592->40591 40595 6e2fa30 40593->40595 40594 6e2fc5a 40594->40586 40595->40594 40596 6e2fc70 GlobalMemoryStatusEx GlobalMemoryStatusEx 40595->40596 40596->40595 40598 6e117cf 40597->40598 40601 6e12f24 40598->40601 40600 6e1393e 40603 6e12f2f 40601->40603 40602 6e14064 40602->40600 40603->40602 40606 6e15ce6 40603->40606 40610 6e15ce8 40603->40610 40607 6e15ce8 40606->40607 40608 6e15d2d 40607->40608 40614 6e15e98 40607->40614 40608->40602 40611 6e15d09 40610->40611 40612 6e15d2d 40611->40612 40613 6e15e98 4 API calls 40611->40613 40612->40602 40613->40612 40615 6e15ea5 40614->40615 40616 6e15ede 40615->40616 40618 6e13e30 40615->40618 40616->40608 40619 6e13e3b 40618->40619 40621 6e15f50 40619->40621 40622 6e149a8 40619->40622 40621->40621 40623 6e149b3 40622->40623 40629 6e149b8 40623->40629 40625 6e15fbf 40633 6e1b458 40625->40633 40642 6e1b440 40625->40642 40626 6e15ff9 40626->40621 40632 6e149c3 40629->40632 40630 6e173c0 40630->40625 40631 6e15ce8 4 API calls 40631->40630 40632->40630 40632->40631 40635 6e1b489 40633->40635 40637 6e1b589 40633->40637 40634 6e1b495 40634->40626 40635->40634 40651 6e1b6c0 40635->40651 40656 6e1b6d0 40635->40656 40636 6e1b4d5 40660 6e1c9c1 40636->40660 40672 6e1c9d0 40636->40672 40637->40626 40644 6e1b589 40642->40644 40645 6e1b489 40642->40645 40643 6e1b495 40643->40626 40644->40626 40645->40643 40647 6e1b6c0 3 API calls 40645->40647 40648 6e1b6d0 3 API calls 40645->40648 40646 6e1b4d5 40649 6e1c9c1 2 API calls 40646->40649 40650 6e1c9d0 2 API calls 40646->40650 40647->40646 40648->40646 40649->40644 40650->40644 40652 6e1b6d0 40651->40652 40684 6e1b720 40652->40684 40693 6e1b710 40652->40693 40653 6e1b6da 40653->40636 40658 6e1b720 2 API calls 40656->40658 40659 6e1b710 2 API calls 40656->40659 40657 6e1b6da 40657->40636 40658->40657 40659->40657 40661 6e1c9fb 40660->40661 40702 6e1aba4 40661->40702 40664 6e1ca7e 40667 6e1caaa 40664->40667 40717 6e1aad0 40664->40717 40669 6e1aba4 GetModuleHandleW 40669->40664 40673 6e1c9fb 40672->40673 40674 6e1aba4 GetModuleHandleW 40673->40674 40675 6e1ca62 40674->40675 40681 6e1cf20 GetModuleHandleW 40675->40681 40682 6e1aba4 GetModuleHandleW 40675->40682 40683 6e1ce78 GetModuleHandleW 40675->40683 40676 6e1ca7e 40677 6e1aad0 GetModuleHandleW 40676->40677 40679 6e1caaa 40676->40679 40678 6e1caee 40677->40678 40680 6e1d890 CreateWindowExW 40678->40680 40680->40679 40681->40676 40682->40676 40683->40676 40685 6e1b731 40684->40685 40689 6e1b754 40684->40689 40686 6e1aad0 GetModuleHandleW 40685->40686 40687 6e1b73c 40686->40687 40687->40689 40692 6e1b9ab GetModuleHandleW 40687->40692 40688 6e1b74c 40688->40689 40690 6e1b958 GetModuleHandleW 40688->40690 40689->40653 40691 6e1b985 40690->40691 40691->40653 40692->40688 40694 6e1b715 40693->40694 40695 6e1aad0 GetModuleHandleW 40694->40695 40697 6e1b754 40694->40697 40696 6e1b73c 40695->40696 40696->40697 40701 6e1b9ab GetModuleHandleW 40696->40701 40697->40653 40698 6e1b74c 40698->40697 40699 6e1b958 GetModuleHandleW 40698->40699 40700 6e1b985 40699->40700 40700->40653 40701->40698 40703 6e1abaf 40702->40703 40704 6e1ca62 40703->40704 40705 6e1d080 GetModuleHandleW 40703->40705 40706 6e1d090 GetModuleHandleW 40703->40706 40704->40669 40707 6e1ce78 40704->40707 40712 6e1cf20 40704->40712 40705->40704 40706->40704 40708 6e1ce88 40707->40708 40709 6e1ce93 40708->40709 40710 6e1d080 GetModuleHandleW 40708->40710 40711 6e1d090 GetModuleHandleW 40708->40711 40709->40664 40710->40709 40711->40709 40713 6e1cf4d 40712->40713 40714 6e1cfce 40713->40714 40715 6e1d080 GetModuleHandleW 40713->40715 40716 6e1d090 GetModuleHandleW 40713->40716 40715->40714 40716->40714 40718 6e1b910 GetModuleHandleW 40717->40718 40720 6e1b985 40718->40720 40721 6e1d890 40720->40721 40722 6e1d8a6 40721->40722 40723 6e1d8de CreateWindowExW 40721->40723 40722->40667 40725 6e1da14 40723->40725 40725->40725 40726 14dd044 40727 14dd05c 40726->40727 40728 14dd0b6 40727->40728 40733 6e1dbd1 40727->40733 40736 6e1daa8 40727->40736 40740 6e1da97 40727->40740 40744 6e1aca4 40727->40744 40748 6e1acdc 40733->40748 40735 6e1dbe7 40735->40728 40737 6e1dace 40736->40737 40738 6e1aca4 GetModuleHandleW 40737->40738 40739 6e1dada 40738->40739 40739->40728 40741 6e1daa5 40740->40741 40742 6e1aca4 GetModuleHandleW 40741->40742 40743 6e1dada 40742->40743 40743->40728 40745 6e1acaf 40744->40745 40746 6e1dbe7 40745->40746 40747 6e1acdc GetModuleHandleW 40745->40747 40746->40728 40747->40746 40749 6e1ace7 40748->40749 40750 6e1aba4 GetModuleHandleW 40749->40750 40751 6e1dc49 40750->40751 40752 6e1aad0 GetModuleHandleW 40751->40752 40753 6e1dcb8 40751->40753 40752->40753 40754 6e132d8 DuplicateHandle 40755 6e1336e 40754->40755 40756 6e1bb78 40757 6e1bbc0 LoadLibraryExW 40756->40757 40758 6e1bbba 40756->40758 40759 6e1bbf1 40757->40759 40758->40757

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 651 6e23490-6e234b1 653 6e234b3-6e234b6 651->653 654 6e234b8-6e234d7 653->654 655 6e234dc-6e234df 653->655 654->655 656 6e23c80-6e23c82 655->656 657 6e234e5-6e23504 655->657 659 6e23c84 656->659 660 6e23c89-6e23c8c 656->660 665 6e23506-6e23509 657->665 666 6e2351d-6e23527 657->666 659->660 660->653 662 6e23c92-6e23c9b 660->662 665->666 667 6e2350b-6e2351b 665->667 669 6e2352d-6e2353c 666->669 667->669 780 6e2353e call 6e23cb0 669->780 781 6e2353e call 6e23ca8 669->781 671 6e23543-6e23548 672 6e23555-6e23832 671->672 673 6e2354a-6e23550 671->673 694 6e23c72-6e23c7f 672->694 695 6e23838-6e238e7 672->695 673->662 704 6e23910 695->704 705 6e238e9-6e2390e 695->705 707 6e23919-6e2392c 704->707 705->707 709 6e23932-6e23954 call 6e2307c 707->709 710 6e23c59-6e23c65 707->710 709->710 714 6e2395a-6e23964 709->714 710->695 711 6e23c6b 710->711 711->694 714->710 715 6e2396a-6e23975 714->715 715->710 716 6e2397b-6e23a51 715->716 728 6e23a53-6e23a55 716->728 729 6e23a5f-6e23a8f 716->729 728->729 733 6e23a91-6e23a93 729->733 734 6e23a9d-6e23aa9 729->734 733->734 735 6e23aab-6e23aaf 734->735 736 6e23b09-6e23b0d 734->736 735->736 739 6e23ab1-6e23adb 735->739 737 6e23b13-6e23b4f 736->737 738 6e23c4a-6e23c53 736->738 750 6e23b51-6e23b53 737->750 751 6e23b5d-6e23b6b 737->751 738->710 738->716 746 6e23ae9-6e23b06 call 6e23088 739->746 747 6e23add-6e23adf 739->747 746->736 747->746 750->751 754 6e23b82-6e23b8d 751->754 755 6e23b6d-6e23b78 751->755 759 6e23ba5-6e23bb6 754->759 760 6e23b8f-6e23b95 754->760 755->754 758 6e23b7a 755->758 758->754 764 6e23bb8-6e23bbe 759->764 765 6e23bce-6e23bda 759->765 761 6e23b97 760->761 762 6e23b99-6e23b9b 760->762 761->759 762->759 766 6e23bc2-6e23bc4 764->766 767 6e23bc0 764->767 769 6e23bf2-6e23c43 765->769 770 6e23bdc-6e23be2 765->770 766->765 767->765 769->738 771 6e23be6-6e23be8 770->771 772 6e23be4 770->772 771->769 772->769 780->671 781->671
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-3723351465
                                          • Opcode ID: 90269ecf4cd81f055e62d4f006086e8d6030a868e9d84313bf9b3717d6bd4352
                                          • Instruction ID: 7d0e181aa492a6f30f1bcf8f63f59d455e83cda7390afb1175329fcd85b67b20
                                          • Opcode Fuzzy Hash: 90269ecf4cd81f055e62d4f006086e8d6030a868e9d84313bf9b3717d6bd4352
                                          • Instruction Fuzzy Hash: D9323D30E1071A8FCB14EF65C99459DB7B2FF89300F14D6AAD449AB264EB34AD85CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1324 6e27d70-6e27d8e 1325 6e27d90-6e27d93 1324->1325 1326 6e27db4-6e27db7 1325->1326 1327 6e27d95-6e27daf 1325->1327 1328 6e27dc4-6e27dc7 1326->1328 1329 6e27db9-6e27dc3 1326->1329 1327->1326 1330 6e27dea-6e27ded 1328->1330 1331 6e27dc9-6e27de5 1328->1331 1333 6e27e04-6e27e06 1330->1333 1334 6e27def-6e27dfd 1330->1334 1331->1330 1335 6e27e08 1333->1335 1336 6e27e0d-6e27e10 1333->1336 1340 6e27e16-6e27e2c 1334->1340 1341 6e27dff 1334->1341 1335->1336 1336->1325 1336->1340 1344 6e27e32-6e27e3b 1340->1344 1345 6e28047-6e28051 1340->1345 1341->1333 1346 6e28052-6e28060 1344->1346 1347 6e27e41-6e27e5e 1344->1347 1350 6e28062-6e28087 1346->1350 1351 6e280b7-6e280be 1346->1351 1358 6e28034-6e28041 1347->1358 1359 6e27e64-6e27e8c 1347->1359 1352 6e28089-6e2808c 1350->1352 1353 6e280a3-6e280b3 1351->1353 1354 6e280c0-6e28104 1351->1354 1356 6e28092-6e280a1 1352->1356 1357 6e282c1-6e282c4 1352->1357 1353->1351 1368 6e28295-6e282ab 1354->1368 1369 6e2810a-6e2811b 1354->1369 1356->1353 1356->1354 1360 6e282c6-6e282e2 1357->1360 1361 6e282e7-6e282ea 1357->1361 1358->1344 1358->1345 1359->1358 1380 6e27e92-6e27e9b 1359->1380 1360->1361 1366 6e282f0-6e282fc 1361->1366 1367 6e28395-6e28397 1361->1367 1377 6e28307-6e28309 1366->1377 1370 6e28399 1367->1370 1371 6e2839e-6e283a1 1367->1371 1368->1357 1378 6e28280-6e2828f 1369->1378 1379 6e28121-6e2813e 1369->1379 1370->1371 1371->1352 1375 6e283a7-6e283b0 1371->1375 1383 6e28321-6e28325 1377->1383 1384 6e2830b-6e28311 1377->1384 1378->1368 1378->1369 1379->1378 1399 6e28144-6e2823a call 6e26598 1379->1399 1380->1346 1389 6e27ea1-6e27ebd 1380->1389 1387 6e28333 1383->1387 1388 6e28327-6e28331 1383->1388 1385 6e28313 1384->1385 1386 6e28315-6e28317 1384->1386 1385->1383 1386->1383 1392 6e28338-6e2833a 1387->1392 1388->1392 1397 6e28022-6e2802e 1389->1397 1398 6e27ec3-6e27eed 1389->1398 1393 6e2834b-6e28384 1392->1393 1394 6e2833c-6e2833f 1392->1394 1393->1356 1412 6e2838a-6e28394 1393->1412 1394->1375 1397->1358 1397->1380 1410 6e27ef3-6e27f1b 1398->1410 1411 6e28018-6e2801d 1398->1411 1458 6e28248 1399->1458 1459 6e2823c-6e28246 1399->1459 1410->1411 1418 6e27f21-6e27f4f 1410->1418 1411->1397 1418->1411 1424 6e27f55-6e27f5e 1418->1424 1424->1411 1425 6e27f64-6e27f96 1424->1425 1432 6e27fa1-6e27fbd 1425->1432 1433 6e27f98-6e27f9c 1425->1433 1432->1397 1436 6e27fbf-6e28016 call 6e26598 1432->1436 1433->1411 1435 6e27f9e 1433->1435 1435->1432 1436->1397 1460 6e2824d-6e2824f 1458->1460 1459->1460 1460->1378 1461 6e28251-6e28256 1460->1461 1462 6e28264 1461->1462 1463 6e28258-6e28262 1461->1463 1464 6e28269-6e2826b 1462->1464 1463->1464 1464->1378 1465 6e2826d-6e28279 1464->1465 1465->1378
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q
                                          • API String ID: 0-127220927
                                          • Opcode ID: c8c7e076aee97c3412c93456d4157b6484e8112ef1961f606cbfc537d4943528
                                          • Instruction ID: 783b83b970483bc6fc5b45e249e524b8123c01bacc26c2aceef22af9f9fba83f
                                          • Opcode Fuzzy Hash: c8c7e076aee97c3412c93456d4157b6484e8112ef1961f606cbfc537d4943528
                                          • Instruction Fuzzy Hash: 6B02AE30B002269FDB58DF68D594AAEB7E7FF84308F148529D4069B394DB35EC86CB91
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 22ef25638b57046c8436f3ff9bdfff5c977800e2afb22abe958c4c8e57bcbbc6
                                          • Instruction ID: 6e2912a4420171157f3f74dd3082c681db87b78bde72b5b8ec119a6699058e88
                                          • Opcode Fuzzy Hash: 22ef25638b57046c8436f3ff9bdfff5c977800e2afb22abe958c4c8e57bcbbc6
                                          • Instruction Fuzzy Hash: 55628C34B002268FDB54DB68D594BADB7B3EF88318F249529D406EB394DB35EC46CB90
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e8774d6d2d95eb48c43c7a202de1894d67f26281e4c83ef1e0d8363e95b78847
                                          • Instruction ID: 738ae6e2770f837d9e22b6fbadaafeb8797bdf9afa44ab30686d54f107b1fda7
                                          • Opcode Fuzzy Hash: e8774d6d2d95eb48c43c7a202de1894d67f26281e4c83ef1e0d8363e95b78847
                                          • Instruction Fuzzy Hash: 5B328E34B0021A9FDB94DF68D980AADB7B6FF88714F209925D505E7390DB38EC46CB91
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dfe098951117c45b7d84e3ddcbd27567662181dd1781e7f03a2b5335a1bad929
                                          • Instruction ID: f3067970d193b94795fac173e9eb830d5ceac63f78b92f8028eaac189ffc21c4
                                          • Opcode Fuzzy Hash: dfe098951117c45b7d84e3ddcbd27567662181dd1781e7f03a2b5335a1bad929
                                          • Instruction Fuzzy Hash: DF12D335E003269BDB64DF64C9C06AEB7B3EF84318F248439D95A9B380DA34DC46CB91
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 055d78916698bd4f8717150d0ebbaf787883a107e7dab3feab00a587101f1140
                                          • Instruction ID: 59b2b43afb17be1b4528407c4b5525208297842a3260ddb9b963edd4e1bcd97e
                                          • Opcode Fuzzy Hash: 055d78916698bd4f8717150d0ebbaf787883a107e7dab3feab00a587101f1140
                                          • Instruction Fuzzy Hash: E7227C30E1031A8FEF64DB69D9C07ADB7A6EB45318F249826E409DB391DA38DC85CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 527 6e2acc8-6e2ace6 528 6e2ace8-6e2aceb 527->528 529 6e2ad05-6e2ad08 528->529 530 6e2aced-6e2ad00 528->530 531 6e2ad0a-6e2ad17 529->531 532 6e2ad1c-6e2ad1f 529->532 530->529 531->532 533 6e2ad21-6e2ad2a 532->533 534 6e2ad39-6e2ad3c 532->534 536 6e2ad30-6e2ad34 533->536 537 6e2aeff-6e2af36 533->537 538 6e2ad3e-6e2ad5a 534->538 539 6e2ad5f-6e2ad62 534->539 536->534 550 6e2af38-6e2af3b 537->550 538->539 541 6e2ad72-6e2ad75 539->541 542 6e2ad64-6e2ad6d 539->542 544 6e2aee5-6e2aeee 541->544 545 6e2ad7b-6e2ad7e 541->545 542->541 544->533 547 6e2aef4-6e2aefe 544->547 548 6e2ad80-6e2ad85 545->548 549 6e2ad88-6e2ad8b 545->549 548->549 554 6e2ad9c-6e2ad9e 549->554 555 6e2ad8d-6e2ad91 549->555 551 6e2af48-6e2af4b 550->551 552 6e2af3d-6e2af41 550->552 561 6e2af58-6e2af5b 551->561 562 6e2af4d-6e2af57 551->562 557 6e2af43 552->557 558 6e2af61-6e2af9c 552->558 559 6e2ada0 554->559 560 6e2ada5-6e2ada8 554->560 555->547 556 6e2ad97 555->556 556->554 557->551 571 6e2afa2-6e2afae 558->571 572 6e2b18f-6e2b1a2 558->572 559->560 560->528 563 6e2adae-6e2add2 560->563 561->558 564 6e2b1c4-6e2b1c7 561->564 582 6e2aee2 563->582 583 6e2add8-6e2ade7 563->583 566 6e2b1ea-6e2b1ed 564->566 567 6e2b1c9-6e2b1e5 564->567 568 6e2b1ef call 6e2b220 566->568 569 6e2b1fc-6e2b1fe 566->569 567->566 577 6e2b1f5-6e2b1f7 568->577 574 6e2b200 569->574 575 6e2b205-6e2b208 569->575 584 6e2afb0-6e2afc9 571->584 585 6e2afce-6e2b012 571->585 576 6e2b1a4 572->576 574->575 575->550 579 6e2b20e-6e2b218 575->579 576->564 577->569 582->544 588 6e2ade9-6e2adef 583->588 589 6e2adff-6e2ae3a call 6e26598 583->589 584->576 600 6e2b014-6e2b026 585->600 601 6e2b02e-6e2b06d 585->601 591 6e2adf3-6e2adf5 588->591 592 6e2adf1 588->592 608 6e2ae52-6e2ae69 589->608 609 6e2ae3c-6e2ae42 589->609 591->589 592->589 600->601 606 6e2b073-6e2b14e call 6e26598 601->606 607 6e2b154-6e2b169 601->607 606->607 607->572 619 6e2ae81-6e2ae92 608->619 620 6e2ae6b-6e2ae71 608->620 612 6e2ae46-6e2ae48 609->612 613 6e2ae44 609->613 612->608 613->608 626 6e2ae94-6e2ae9a 619->626 627 6e2aeaa-6e2aedb 619->627 621 6e2ae73 620->621 622 6e2ae75-6e2ae77 620->622 621->619 622->619 628 6e2ae9e-6e2aea0 626->628 629 6e2ae9c 626->629 627->582 628->627 629->627
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-1273862796
                                          • Opcode ID: b2d0fe82da9cfef37e6539f1398ef4fbf3bed9c2ef39236ab56102fc0d5d913d
                                          • Instruction ID: 784387facac6cde032a308114ff1d9feb61dbd467aafdab02847242b69e17e44
                                          • Opcode Fuzzy Hash: b2d0fe82da9cfef37e6539f1398ef4fbf3bed9c2ef39236ab56102fc0d5d913d
                                          • Instruction Fuzzy Hash: 90E14C30E1031A8FDB68DF69D5906AEB7B7EF85208F209529D805AB354DB34D886CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 782 6e2b648-6e2b668 783 6e2b66a-6e2b66d 782->783 784 6e2b684-6e2b687 783->784 785 6e2b66f-6e2b673 783->785 788 6e2b689-6e2b68b 784->788 789 6e2b68e-6e2b691 784->789 786 6e2b9db-6e2ba16 785->786 787 6e2b679-6e2b67f 785->787 798 6e2ba18-6e2ba1b 786->798 787->784 788->789 790 6e2b6a3-6e2b6a6 789->790 791 6e2b693 789->791 792 6e2b81a-6e2b81b 790->792 793 6e2b6ac-6e2b6af 790->793 795 6e2b69b-6e2b69e 791->795 799 6e2b820-6e2b823 792->799 796 6e2b6b1-6e2b6b5 793->796 797 6e2b6c6-6e2b6c9 793->797 795->790 796->786 800 6e2b6bb-6e2b6c1 796->800 803 6e2b6f0-6e2b6f3 797->803 804 6e2b6cb-6e2b6cf 797->804 801 6e2ba3e-6e2ba41 798->801 802 6e2ba1d-6e2ba39 798->802 799->792 805 6e2b825-6e2b828 799->805 800->797 809 6e2ba47-6e2ba6f 801->809 810 6e2bcad-6e2bcaf 801->810 802->801 811 6e2b716-6e2b719 803->811 812 6e2b6f5-6e2b711 803->812 804->786 806 6e2b6d5-6e2b6e5 804->806 807 6e2b845-6e2b848 805->807 808 6e2b82a-6e2b833 805->808 806->792 838 6e2b6eb 806->838 819 6e2b857-6e2b85a 807->819 820 6e2b84a-6e2b850 807->820 808->786 816 6e2b839-6e2b840 808->816 857 6e2ba71-6e2ba74 809->857 858 6e2ba79-6e2babd 809->858 817 6e2bcb1 810->817 818 6e2bcb6-6e2bcb9 810->818 813 6e2b71b-6e2b71f 811->813 814 6e2b73c-6e2b73f 811->814 812->811 813->786 821 6e2b725-6e2b735 813->821 822 6e2b741-6e2b744 814->822 823 6e2b749-6e2b74c 814->823 816->807 817->818 818->798 825 6e2bcbf-6e2bcc8 818->825 829 6e2b864-6e2b867 819->829 830 6e2b85c-6e2b861 819->830 826 6e2b852 820->826 827 6e2b87c-6e2b882 820->827 821->804 847 6e2b737 821->847 822->823 836 6e2b759-6e2b75c 823->836 837 6e2b74e-6e2b754 823->837 826->819 827->786 834 6e2b888-6e2b88f 827->834 832 6e2b877-6e2b87a 829->832 833 6e2b869-6e2b872 829->833 830->829 832->827 840 6e2b894-6e2b897 832->840 833->832 834->840 842 6e2b773-6e2b776 836->842 843 6e2b75e-6e2b762 836->843 837->836 838->803 845 6e2b899-6e2b89d 840->845 846 6e2b8be-6e2b8c1 840->846 849 6e2b786-6e2b789 842->849 850 6e2b778-6e2b781 842->850 843->786 848 6e2b768-6e2b76e 843->848 845->786 854 6e2b8a3-6e2b8b3 845->854 855 6e2b8c3-6e2b8d8 846->855 856 6e2b8ff-6e2b902 846->856 847->814 848->842 852 6e2b78b-6e2b794 849->852 853 6e2b799-6e2b79c 849->853 850->849 852->853 861 6e2b7b2-6e2b7b5 853->861 862 6e2b79e-6e2b7a7 853->862 854->813 872 6e2b8b9 854->872 855->786 875 6e2b8de-6e2b8fa 855->875 859 6e2b957-6e2b95a 856->859 860 6e2b904-6e2b952 call 6e26598 856->860 857->825 900 6e2bca2-6e2bcac 858->900 901 6e2bac3-6e2bacc 858->901 859->862 863 6e2b960-6e2b963 859->863 860->859 865 6e2b7d7-6e2b7da 861->865 866 6e2b7b7-6e2b7d2 861->866 862->808 864 6e2b7ad 862->864 863->820 869 6e2b969-6e2b96c 863->869 864->861 873 6e2b7e7-6e2b7ea 865->873 874 6e2b7dc-6e2b7e2 865->874 866->865 876 6e2b9a7-6e2b9aa 869->876 877 6e2b96e-6e2b983 869->877 872->846 880 6e2b7fa-6e2b7fd 873->880 881 6e2b7ec-6e2b7f5 873->881 874->873 875->856 886 6e2b9be-6e2b9c0 876->886 887 6e2b9ac-6e2b9b3 876->887 877->786 896 6e2b985-6e2b9a2 877->896 880->792 882 6e2b7ff-6e2b802 880->882 881->880 888 6e2b804-6e2b810 882->888 889 6e2b815-6e2b818 882->889 893 6e2b9c2 886->893 894 6e2b9c7-6e2b9ca 886->894 887->881 892 6e2b9b9 887->892 888->889 889->792 889->799 892->886 893->894 894->783 895 6e2b9d0-6e2b9da 894->895 896->876 904 6e2bad2-6e2bb3e call 6e26598 901->904 905 6e2bc98-6e2bc9d 901->905 916 6e2bb44-6e2bb49 904->916 917 6e2bc38-6e2bc4d 904->917 905->900 919 6e2bb65 916->919 920 6e2bb4b-6e2bb51 916->920 917->905 923 6e2bb67-6e2bb6d 919->923 921 6e2bb53-6e2bb55 920->921 922 6e2bb57-6e2bb59 920->922 924 6e2bb63 921->924 922->924 925 6e2bb82-6e2bb8f 923->925 926 6e2bb6f-6e2bb75 923->926 924->923 933 6e2bb91-6e2bb97 925->933 934 6e2bba7-6e2bbb4 925->934 927 6e2bc23-6e2bc32 926->927 928 6e2bb7b 926->928 927->916 927->917 928->925 929 6e2bbb6-6e2bbc3 928->929 930 6e2bbea-6e2bbf7 928->930 942 6e2bbc5-6e2bbcb 929->942 943 6e2bbdb-6e2bbe8 929->943 939 6e2bbf9-6e2bbff 930->939 940 6e2bc0f-6e2bc1c 930->940 935 6e2bb9b-6e2bb9d 933->935 936 6e2bb99 933->936 934->927 935->934 936->934 944 6e2bc03-6e2bc05 939->944 945 6e2bc01 939->945 940->927 946 6e2bbcf-6e2bbd1 942->946 947 6e2bbcd 942->947 943->927 944->940 945->940 946->943 947->943
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-3723351465
                                          • Opcode ID: ff3d8b49e00deda59b416a8b0ac249c5ac3aeed7fae40f023abca7597ad5cb5b
                                          • Instruction ID: 60e0d00865647e6cbecc489c6cb1fd08591c0d36f5d8872a22d1309a50a08c87
                                          • Opcode Fuzzy Hash: ff3d8b49e00deda59b416a8b0ac249c5ac3aeed7fae40f023abca7597ad5cb5b
                                          • Instruction Fuzzy Hash: 04029D30E1032A8FDBA4DF69D5806ADB7B2FF45308F24992AD409DB255DB34DC85CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 950 6e29148-6e2916d 951 6e2916f-6e29172 950->951 952 6e29a30-6e29a33 951->952 953 6e29178-6e2918d 951->953 954 6e29a35-6e29a54 952->954 955 6e29a59-6e29a5b 952->955 961 6e291a5-6e291bb 953->961 962 6e2918f-6e29195 953->962 954->955 957 6e29a62-6e29a65 955->957 958 6e29a5d 955->958 957->951 959 6e29a6b-6e29a75 957->959 958->957 967 6e291c6-6e291c8 961->967 963 6e29197 962->963 964 6e29199-6e2919b 962->964 963->961 964->961 968 6e291e0-6e29251 967->968 969 6e291ca-6e291d0 967->969 980 6e29253-6e29276 968->980 981 6e2927d-6e29299 968->981 970 6e291d2 969->970 971 6e291d4-6e291d6 969->971 970->968 971->968 980->981 986 6e292c5-6e292e0 981->986 987 6e2929b-6e292be 981->987 992 6e292e2-6e29304 986->992 993 6e2930b-6e29326 986->993 987->986 992->993 998 6e2934b-6e29359 993->998 999 6e29328-6e29344 993->999 1000 6e2935b-6e29364 998->1000 1001 6e29369-6e293e3 998->1001 999->998 1000->959 1007 6e29430-6e29445 1001->1007 1008 6e293e5-6e29403 1001->1008 1007->952 1012 6e29405-6e29414 1008->1012 1013 6e2941f-6e2942e 1008->1013 1012->1013 1013->1007 1013->1008
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: 9b7f17acaf8b92b322ec6ddd5b3b702545f3d6d61477aa32c5bfddfdd0da851e
                                          • Instruction ID: 8909ea51e0600c660609a5b44eca4c3c7d04ca46fcc448baf5bdbf1cb92ec953
                                          • Opcode Fuzzy Hash: 9b7f17acaf8b92b322ec6ddd5b3b702545f3d6d61477aa32c5bfddfdd0da851e
                                          • Instruction Fuzzy Hash: F0917030F0021A8FDB94DF76D9907AEB3F6FF84204F109469C80AEB355EA349D468B91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1016 6e2cf38-6e2cf53 1017 6e2cf55-6e2cf58 1016->1017 1018 6e2cfa1-6e2cfa4 1017->1018 1019 6e2cf5a-6e2cf9c 1017->1019 1020 6e2cfa6-6e2cfb5 1018->1020 1021 6e2cfed-6e2cff0 1018->1021 1019->1018 1022 6e2cfb7-6e2cfbc 1020->1022 1023 6e2cfc4-6e2cfd0 1020->1023 1025 6e2cff2-6e2cff4 1021->1025 1026 6e2cfff-6e2d002 1021->1026 1022->1023 1027 6e2cfd6-6e2cfe8 1023->1027 1028 6e2d955-6e2d98e 1023->1028 1029 6e2d421 1025->1029 1030 6e2cffa 1025->1030 1031 6e2d004-6e2d01a 1026->1031 1032 6e2d01f-6e2d022 1026->1032 1027->1021 1047 6e2d990-6e2d993 1028->1047 1035 6e2d424-6e2d430 1029->1035 1030->1026 1031->1032 1033 6e2d024-6e2d066 1032->1033 1034 6e2d06b-6e2d06e 1032->1034 1033->1034 1038 6e2d070-6e2d0b2 1034->1038 1039 6e2d0b7-6e2d0ba 1034->1039 1041 6e2d436-6e2d723 1035->1041 1042 6e2d17c-6e2d18b 1035->1042 1038->1039 1048 6e2d0c9-6e2d0cc 1039->1048 1049 6e2d0bc-6e2d0be 1039->1049 1229 6e2d94a-6e2d954 1041->1229 1230 6e2d729-6e2d72f 1041->1230 1045 6e2d19a-6e2d1a6 1042->1045 1046 6e2d18d-6e2d192 1042->1046 1045->1028 1060 6e2d1ac-6e2d1be 1045->1060 1046->1045 1056 6e2d9a2-6e2d9a5 1047->1056 1057 6e2d995 call 6e2daad 1047->1057 1051 6e2d115-6e2d118 1048->1051 1052 6e2d0ce-6e2d110 1048->1052 1058 6e2d0c4 1049->1058 1059 6e2d2df-6e2d2e8 1049->1059 1067 6e2d161-6e2d164 1051->1067 1068 6e2d11a-6e2d15c 1051->1068 1052->1051 1064 6e2d9a7-6e2d9c3 1056->1064 1065 6e2d9c8-6e2d9cb 1056->1065 1074 6e2d99b-6e2d99d 1057->1074 1058->1048 1061 6e2d2f7-6e2d303 1059->1061 1062 6e2d2ea-6e2d2ef 1059->1062 1082 6e2d1c3-6e2d1c6 1060->1082 1069 6e2d414-6e2d419 1061->1069 1070 6e2d309-6e2d31d 1061->1070 1062->1061 1064->1065 1077 6e2d9fe-6e2da00 1065->1077 1078 6e2d9cd-6e2d9f9 1065->1078 1067->1035 1072 6e2d16a-6e2d16d 1067->1072 1068->1067 1069->1029 1070->1029 1097 6e2d323-6e2d335 1070->1097 1080 6e2d177-6e2d17a 1072->1080 1081 6e2d16f-6e2d174 1072->1081 1074->1056 1084 6e2da02 1077->1084 1085 6e2da07-6e2da0a 1077->1085 1078->1077 1080->1042 1080->1082 1081->1080 1092 6e2d1c8-6e2d20a 1082->1092 1093 6e2d20f-6e2d212 1082->1093 1084->1085 1085->1047 1095 6e2da0c-6e2da1b 1085->1095 1092->1093 1100 6e2d214-6e2d256 1093->1100 1101 6e2d25b-6e2d25e 1093->1101 1114 6e2da82-6e2da97 1095->1114 1115 6e2da1d-6e2da80 call 6e26598 1095->1115 1117 6e2d337-6e2d33d 1097->1117 1118 6e2d359-6e2d35b 1097->1118 1100->1101 1103 6e2d260-6e2d2a2 1101->1103 1104 6e2d2a7-6e2d2aa 1101->1104 1103->1104 1112 6e2d2ac-6e2d2c8 1104->1112 1113 6e2d2cd-6e2d2cf 1104->1113 1112->1113 1125 6e2d2d1 1113->1125 1126 6e2d2d6-6e2d2d9 1113->1126 1137 6e2da98 1114->1137 1115->1114 1130 6e2d341-6e2d34d 1117->1130 1131 6e2d33f 1117->1131 1132 6e2d365-6e2d371 1118->1132 1125->1126 1126->1017 1126->1059 1135 6e2d34f-6e2d357 1130->1135 1131->1135 1149 6e2d373-6e2d37d 1132->1149 1150 6e2d37f 1132->1150 1135->1132 1137->1137 1155 6e2d384-6e2d386 1149->1155 1150->1155 1155->1029 1157 6e2d38c-6e2d3a8 call 6e26598 1155->1157 1170 6e2d3b7-6e2d3c3 1157->1170 1171 6e2d3aa-6e2d3af 1157->1171 1170->1069 1173 6e2d3c5-6e2d412 1170->1173 1171->1170 1173->1029 1231 6e2d731-6e2d736 1230->1231 1232 6e2d73e-6e2d747 1230->1232 1231->1232 1232->1028 1233 6e2d74d-6e2d760 1232->1233 1235 6e2d766-6e2d76c 1233->1235 1236 6e2d93a-6e2d944 1233->1236 1237 6e2d77b-6e2d784 1235->1237 1238 6e2d76e-6e2d773 1235->1238 1236->1229 1236->1230 1237->1028 1239 6e2d78a-6e2d7ab 1237->1239 1238->1237 1242 6e2d7ba-6e2d7c3 1239->1242 1243 6e2d7ad-6e2d7b2 1239->1243 1242->1028 1244 6e2d7c9-6e2d7e6 1242->1244 1243->1242 1244->1236 1247 6e2d7ec-6e2d7f2 1244->1247 1247->1028 1248 6e2d7f8-6e2d811 1247->1248 1250 6e2d817-6e2d83e 1248->1250 1251 6e2d92d-6e2d934 1248->1251 1250->1028 1254 6e2d844-6e2d84e 1250->1254 1251->1236 1251->1247 1254->1028 1255 6e2d854-6e2d86b 1254->1255 1257 6e2d87a-6e2d895 1255->1257 1258 6e2d86d-6e2d878 1255->1258 1257->1251 1263 6e2d89b-6e2d8b4 call 6e26598 1257->1263 1258->1257 1267 6e2d8c3-6e2d8cc 1263->1267 1268 6e2d8b6-6e2d8bb 1263->1268 1267->1028 1269 6e2d8d2-6e2d926 1267->1269 1268->1267 1269->1251
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q
                                          • API String ID: 0-182748909
                                          • Opcode ID: 4066e6cb056de46fca46bbfe2dd2a398b3b003761bb259ed3a34d69d9cf892ef
                                          • Instruction ID: 0b730da82ae9536bbaab4b5ed110f344289ebcc1a01a9329cc65b80ca9887403
                                          • Opcode Fuzzy Hash: 4066e6cb056de46fca46bbfe2dd2a398b3b003761bb259ed3a34d69d9cf892ef
                                          • Instruction Fuzzy Hash: 7A623F3064021A8FCB55EF68D990A9DB7B6FF85304B20C938D1099F359DB79EC46CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1277 6e24b98-6e24bbc 1278 6e24bbe-6e24bc1 1277->1278 1279 6e252a0-6e252a3 1278->1279 1280 6e24bc7-6e24cbf 1278->1280 1281 6e252c4-6e252c6 1279->1281 1282 6e252a5-6e252bf 1279->1282 1300 6e24d42-6e24d49 1280->1300 1301 6e24cc5-6e24d12 call 6e25440 1280->1301 1283 6e252c8 1281->1283 1284 6e252cd-6e252d0 1281->1284 1282->1281 1283->1284 1284->1278 1286 6e252d6-6e252e3 1284->1286 1302 6e24d4f-6e24dbf 1300->1302 1303 6e24dcd-6e24dd6 1300->1303 1314 6e24d18-6e24d34 1301->1314 1320 6e24dc1 1302->1320 1321 6e24dca 1302->1321 1303->1286 1317 6e24d36 1314->1317 1318 6e24d3f-6e24d40 1314->1318 1317->1318 1318->1300 1320->1321 1321->1303
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fbq$XPbq$\Obq
                                          • API String ID: 0-4057264190
                                          • Opcode ID: 32efc572b37e39b7dee74cecbbe58337eb3fd5ac1b08325cff1eea928d36523e
                                          • Instruction ID: 8f1dc5d9cc1e41a4bda5f11ae3ab0450327f4aa2678206fed6a307d413edef2f
                                          • Opcode Fuzzy Hash: 32efc572b37e39b7dee74cecbbe58337eb3fd5ac1b08325cff1eea928d36523e
                                          • Instruction Fuzzy Hash: D1617D70F00219DFEB549FA8C8547AEBAF7FF88304F208429E106AB395DA758C418F91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2236 6e29139-6e2916d 2237 6e2916f-6e29172 2236->2237 2238 6e29a30-6e29a33 2237->2238 2239 6e29178-6e2918d 2237->2239 2240 6e29a35-6e29a54 2238->2240 2241 6e29a59-6e29a5b 2238->2241 2247 6e291a5-6e291bb 2239->2247 2248 6e2918f-6e29195 2239->2248 2240->2241 2243 6e29a62-6e29a65 2241->2243 2244 6e29a5d 2241->2244 2243->2237 2245 6e29a6b-6e29a75 2243->2245 2244->2243 2253 6e291c6-6e291c8 2247->2253 2249 6e29197 2248->2249 2250 6e29199-6e2919b 2248->2250 2249->2247 2250->2247 2254 6e291e0-6e29251 2253->2254 2255 6e291ca-6e291d0 2253->2255 2266 6e29253-6e29276 2254->2266 2267 6e2927d-6e29299 2254->2267 2256 6e291d2 2255->2256 2257 6e291d4-6e291d6 2255->2257 2256->2254 2257->2254 2266->2267 2272 6e292c5-6e292e0 2267->2272 2273 6e2929b-6e292be 2267->2273 2278 6e292e2-6e29304 2272->2278 2279 6e2930b-6e29326 2272->2279 2273->2272 2278->2279 2284 6e2934b-6e29359 2279->2284 2285 6e29328-6e29344 2279->2285 2286 6e2935b-6e29364 2284->2286 2287 6e29369-6e293e3 2284->2287 2285->2284 2286->2245 2293 6e29430-6e29445 2287->2293 2294 6e293e5-6e29403 2287->2294 2293->2238 2298 6e29405-6e29414 2294->2298 2299 6e2941f-6e2942e 2294->2299 2298->2299 2299->2293 2299->2294
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q
                                          • API String ID: 0-127220927
                                          • Opcode ID: 191e715fc57fc47e424f18d88f62ebb6807157169840c67e86c0ae1b7cafea44
                                          • Instruction ID: b7809aacbae0c7f8fb9ca24b4d585e7667bed848d0193ea7a957456c1bb02ad3
                                          • Opcode Fuzzy Hash: 191e715fc57fc47e424f18d88f62ebb6807157169840c67e86c0ae1b7cafea44
                                          • Instruction Fuzzy Hash: CB516330B002169FDB94DF76D950BAE77F6FF88644F109429C80ADB395EA349C46CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2852 6e1b720-6e1b72f 2853 6e1b731-6e1b73e call 6e1aad0 2852->2853 2854 6e1b75b-6e1b75f 2852->2854 2860 6e1b740-6e1b74e call 6e1b9ab 2853->2860 2861 6e1b754 2853->2861 2856 6e1b761-6e1b76b 2854->2856 2857 6e1b773-6e1b7b4 2854->2857 2856->2857 2863 6e1b7c1-6e1b7cf 2857->2863 2864 6e1b7b6-6e1b7be 2857->2864 2860->2861 2870 6e1b890-6e1b950 2860->2870 2861->2854 2865 6e1b7d1-6e1b7d6 2863->2865 2866 6e1b7f3-6e1b7f5 2863->2866 2864->2863 2868 6e1b7e1 2865->2868 2869 6e1b7d8-6e1b7df call 6e1aadc 2865->2869 2871 6e1b7f8-6e1b7ff 2866->2871 2873 6e1b7e3-6e1b7f1 2868->2873 2869->2873 2903 6e1b952-6e1b955 2870->2903 2904 6e1b958-6e1b983 GetModuleHandleW 2870->2904 2874 6e1b801-6e1b809 2871->2874 2875 6e1b80c-6e1b813 2871->2875 2873->2871 2874->2875 2878 6e1b820-6e1b829 call 6e13c94 2875->2878 2879 6e1b815-6e1b81d 2875->2879 2883 6e1b836-6e1b83b 2878->2883 2884 6e1b82b-6e1b833 2878->2884 2879->2878 2885 6e1b859-6e1b85d 2883->2885 2886 6e1b83d-6e1b844 2883->2886 2884->2883 2909 6e1b860 call 6e1bc68 2885->2909 2910 6e1b860 call 6e1bc78 2885->2910 2886->2885 2888 6e1b846-6e1b856 call 6e19640 call 6e1aaec 2886->2888 2888->2885 2891 6e1b863-6e1b866 2893 6e1b889-6e1b88f 2891->2893 2894 6e1b868-6e1b886 2891->2894 2894->2893 2903->2904 2905 6e1b985-6e1b98b 2904->2905 2906 6e1b98c-6e1b9a0 2904->2906 2905->2906 2909->2891 2910->2891
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302004358.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: d62aa0c613df0d3360585fdc02fb621af3a960ab49816a5888a1b772b35a523a
                                          • Instruction ID: 5a18c25bc344441d6fde40dd4930fdcc82062f5cc5e52b5b774cc0e1b914f364
                                          • Opcode Fuzzy Hash: d62aa0c613df0d3360585fdc02fb621af3a960ab49816a5888a1b772b35a523a
                                          • Instruction Fuzzy Hash: 15815970A00B058FD764DF2AD49076ABBF5FF48304F008A2ED49ADBA50DB74E805CB90
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06E1DA02
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302004358.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: de98843c15873f16c05dd5be4537c909c9db76b5fc89ea78a1d55e419c342285
                                          • Instruction ID: 44acc9b25550879a56d054a187c25dd120fa572f65742cf1586cd06cce26c4ea
                                          • Opcode Fuzzy Hash: de98843c15873f16c05dd5be4537c909c9db76b5fc89ea78a1d55e419c342285
                                          • Instruction Fuzzy Hash: 2A5111B1C04349AFCB11CFA9C884ADDBFB6BF49314F14816AE918AB220D3759991CF50
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06E1DA02
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302004358.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: a79636166ec3072852ff39d81278b86a5f18a32cba577f3c2d6b129b3cf462f3
                                          • Instruction ID: 269845f8e110764b9d4cef453061be6011b4e78403edaefacd2c3c5a7f9166c3
                                          • Opcode Fuzzy Hash: a79636166ec3072852ff39d81278b86a5f18a32cba577f3c2d6b129b3cf462f3
                                          • Instruction Fuzzy Hash: 8E41B0B1D00349DFDB14CF99C894ADEFBB5BF88314F24812AE919AB210D775A985CF90
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0308F0BF
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3281602323.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_3080000_mpTrle.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: b9c92a3c2f88d1d24e956a237b6fdaa61436cf7fd7ed7676934b45be58428a7b
                                          • Instruction ID: ba93bc259154f525236c008142125f452b7e30339a841af4ac1c9371e193c679
                                          • Opcode Fuzzy Hash: b9c92a3c2f88d1d24e956a237b6fdaa61436cf7fd7ed7676934b45be58428a7b
                                          • Instruction Fuzzy Hash: 822177B1C0025A9FCB24EFAAD4446EEFBF4EF48310F15855AD948A3250D7389945CFA1
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06E1335F
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302004358.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: e0ba87268dd0f2bc315419b8e0412c0a2a6fc5544eb9ca5d3bcbe5362c76e0c4
                                          • Instruction ID: a27d344af259ca2e6e5c63614a4c189b56e8e9c9fc725b31d07229bc4605fd18
                                          • Opcode Fuzzy Hash: e0ba87268dd0f2bc315419b8e0412c0a2a6fc5544eb9ca5d3bcbe5362c76e0c4
                                          • Instruction Fuzzy Hash: EB21E2B5D002489FDB10CFAAD984AEEBBF5FB48310F14801AE918A7350D378A941CFA4
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 06E1335F
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302004358.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 71787085ee66e7b25d145251c95b202bdaf628be9d89f32ebd625aa9451f24a0
                                          • Instruction ID: 3cbf1c3e6af3d42f287b083704744fa541a555e015b1787fe7d16e2b1d782ba9
                                          • Opcode Fuzzy Hash: 71787085ee66e7b25d145251c95b202bdaf628be9d89f32ebd625aa9451f24a0
                                          • Instruction Fuzzy Hash: 6C21C4B5D002489FDB10CFAAD984ADEFBF9FB48310F14841AE918A7350D378A944CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 06E1BBE2
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302004358.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: fb5c3cc077e671e71e9f90cf76238ae28e6aca48d499d46880df784a8d0ad22e
                                          • Instruction ID: 97e7504d074c141b1010c67e891b9a9eed87f70168b6de5e4a6a9a5c1df726d8
                                          • Opcode Fuzzy Hash: fb5c3cc077e671e71e9f90cf76238ae28e6aca48d499d46880df784a8d0ad22e
                                          • Instruction Fuzzy Hash: 491112B6C003498FCB10CFAAC884ADEFBF4EB89310F10842AD519A7604C379A545CFA0
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0308F0BF
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3281602323.0000000003080000.00000040.00000800.00020000.00000000.sdmp, Offset: 03080000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_3080000_mpTrle.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 980d667c7c633947d8c153376e8604f1e85754c13c1519c39c0acd0510e69ff3
                                          • Instruction ID: 3243d3c96e684aab0c55cb9d5a52dd9fce9141a67685a67d2ef6768b77e18e34
                                          • Opcode Fuzzy Hash: 980d667c7c633947d8c153376e8604f1e85754c13c1519c39c0acd0510e69ff3
                                          • Instruction Fuzzy Hash: 2E11EFB1C0065A9FCB10DFAAD544AAEFBF4EF48320F15816AD918A7240D778A944CFA5
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,?,?), ref: 06E1BBE2
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302004358.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: efd2927c4432a19c136d4a805f07825784e18ff7b2bf948f1ef15b195c58451e
                                          • Instruction ID: 3de6dc7112260ce9a8f7d3b7841daf2af9180f24b00f93b03caaa9a969806dc1
                                          • Opcode Fuzzy Hash: efd2927c4432a19c136d4a805f07825784e18ff7b2bf948f1ef15b195c58451e
                                          • Instruction Fuzzy Hash: 0C11F0B6C003498FDB10DF9AC884ADEFBF8EB88310F10842ED519A7614C379A545CFA5
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,06E1B73C), ref: 06E1B976
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302004358.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e10000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: e326c51f25347453b2df519af91e4c41ef812791d7bca87a036a85c7aefbc1d1
                                          • Instruction ID: fca35235f17be620b8f83c7cc09c48acd294d284bd743d6ba25346579e380e9e
                                          • Opcode Fuzzy Hash: e326c51f25347453b2df519af91e4c41ef812791d7bca87a036a85c7aefbc1d1
                                          • Instruction Fuzzy Hash: 031102B5C007498FCB10DF9AC484ADEFBF4EB99214F10842AD519BB210C379A545CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPbq
                                          • API String ID: 0-864591470
                                          • Opcode ID: 5354528028d8e1e7aa3243373d8dcb13a6c551460615a9ed6dbd78bf89ce3ed3
                                          • Instruction ID: 74757e49c108e7cdd7ec6e8f3d30006dd9e87fb24fdb57072cfd9a17b13652e6
                                          • Opcode Fuzzy Hash: 5354528028d8e1e7aa3243373d8dcb13a6c551460615a9ed6dbd78bf89ce3ed3
                                          • Instruction Fuzzy Hash: C2416E70B002199FDB54DFA9C854BAEBBF7FF88704F208529E106AB395DA748C058F91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q
                                          • API String ID: 0-3168235125
                                          • Opcode ID: e49ce6b0cffc13493fbd767959f1c70618daa87b01aea169c8cf69be204cfe71
                                          • Instruction ID: d890c3f54e48b96e38eb281c970dc82e12840c06c8af97c574be1420e3f00707
                                          • Opcode Fuzzy Hash: e49ce6b0cffc13493fbd767959f1c70618daa87b01aea169c8cf69be204cfe71
                                          • Instruction Fuzzy Hash: 6941AF70E0031A9FDB64DF64C89069EBBB6FF85304F208929E502EB244EB74D946CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q
                                          • API String ID: 0-3168235125
                                          • Opcode ID: 29d373499c755be3b65082ba74813d4e607f600005cb29564940f7a8252e9948
                                          • Instruction ID: 77f3dd65d73d221161cf26bb9d5f6c801327fd7c01a41ce4ff13cb4b91e8382a
                                          • Opcode Fuzzy Hash: 29d373499c755be3b65082ba74813d4e607f600005cb29564940f7a8252e9948
                                          • Instruction Fuzzy Hash: 8D312E30B103128FDB58AB74D5546AE3AA3FF89204F108528E106DB395DE39DE06CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q
                                          • API String ID: 0-3168235125
                                          • Opcode ID: 9762d6d7b22e0c83c550b3bf66068c4ad1ded4e901c4cb7c414b576653f5b2b8
                                          • Instruction ID: ea3b2aec7c7b22361deb93cea1edb2d348c2a55287c42a834d36b2614fbf3664
                                          • Opcode Fuzzy Hash: 9762d6d7b22e0c83c550b3bf66068c4ad1ded4e901c4cb7c414b576653f5b2b8
                                          • Instruction Fuzzy Hash: 3B311030B103128FCB58AB74D55466E3AE7FF89204F108538D106DB395EE39DE02C795
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q
                                          • API String ID: 0-1007455737
                                          • Opcode ID: 07e841830b3412f08ce79350383ff43ad08abec68954be4c4ce0ef23563a66de
                                          • Instruction ID: 2e7c2e5c09cbc948b254c7d82c57388d84526889afd18f6139c9881b64c8fc29
                                          • Opcode Fuzzy Hash: 07e841830b3412f08ce79350383ff43ad08abec68954be4c4ce0ef23563a66de
                                          • Instruction Fuzzy Hash: DBF0A431B00322CFDFA89F85EA846AE77A6FB40318F145069D906D7250D635ED0AC795
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d22e3160345eadc877da6636935b9b98e2bf248c1de48e29dba95b040277fe7b
                                          • Instruction ID: 87308a0d856b6e866ae8a642f6626d52c33189ae4352a4c22c3837b90e66c2a6
                                          • Opcode Fuzzy Hash: d22e3160345eadc877da6636935b9b98e2bf248c1de48e29dba95b040277fe7b
                                          • Instruction Fuzzy Hash: 1461B0B2F001224FDB54AA6EC88065FBADBAFD4214F154479D80EDB364DEB9DD0287D1
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc27be46351f61b9a521d35bfb6b7386b2dd52a42cf97d9b88b4245ab4a48c20
                                          • Instruction ID: cbc251ee39b350f42aa1d76cdc28b5e9c9df200a7324402c0d4e40d58eab1957
                                          • Opcode Fuzzy Hash: cc27be46351f61b9a521d35bfb6b7386b2dd52a42cf97d9b88b4245ab4a48c20
                                          • Instruction Fuzzy Hash: 17813B34B0021A9BDB54DFA9D59479EB7F7EF89304F208528D40AEB394DB34DC468B92
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5bc0194fc6c80a666ab4dce67f9b326e7bc64134eb74a80c436f8fbacffd518c
                                          • Instruction ID: 48fe7b2b5401ad5771f1bbfe877a5aecdfbb0f55241739945015cdf7fcb7b9af
                                          • Opcode Fuzzy Hash: 5bc0194fc6c80a666ab4dce67f9b326e7bc64134eb74a80c436f8fbacffd518c
                                          • Instruction Fuzzy Hash: EE913E30E1031A8FDF64DF68C890BDDB7B1FF85304F208599D549AB295DB70AA85CB91
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: af312e439971aa60fa916d0502658990618182f9fc631917b15e7f9304820385
                                          • Instruction ID: 49e3e2456c26f6657dc00621414417d6802488ab057c3d454415dd838e2f0a52
                                          • Opcode Fuzzy Hash: af312e439971aa60fa916d0502658990618182f9fc631917b15e7f9304820385
                                          • Instruction Fuzzy Hash: AB912D30E1021ACBDF64DF68C890B9DB7B2FF85304F208599D549AB295DB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 49cdff667a3dc7de2e200319e76d92692c1351fb902d96190278a15c60643538
                                          • Instruction ID: e0db554fb0e0413a59378587b6fa2a08e306862df7e66b4d362e09378f693904
                                          • Opcode Fuzzy Hash: 49cdff667a3dc7de2e200319e76d92692c1351fb902d96190278a15c60643538
                                          • Instruction Fuzzy Hash: E5713A70A0022A9FDB54DFA8D990A9EBBF7FF84304F249429D009EB255DB34EC46CB50
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1a00a01be2e52c9da18a6dcdf4167b8a3e7ca1016f0e3e7c37a06fffbc693261
                                          • Instruction ID: 3ca4c2023d6f0249c6a8a71f184c9cabf0b3fdc39426b9d1b9b0e48d0e7f5ad0
                                          • Opcode Fuzzy Hash: 1a00a01be2e52c9da18a6dcdf4167b8a3e7ca1016f0e3e7c37a06fffbc693261
                                          • Instruction Fuzzy Hash: 96711970A0022A9FDB54DFA9D990A9EBBF6FF84304F249429D019AB255DB34EC46CB50
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 62df99d6d445a2fd234b5a740293966fcf04032f0aba3bc3d05749f5fb9f9f7d
                                          • Instruction ID: b19e03268bfc23991c1f7c5b0cbe460bbc22abc83b5fb5bb16b9f5fa94f4f3a2
                                          • Opcode Fuzzy Hash: 62df99d6d445a2fd234b5a740293966fcf04032f0aba3bc3d05749f5fb9f9f7d
                                          • Instruction Fuzzy Hash: DC51C131E40216DFDB64EF78E4946ADBBB3FF84319F20886AD106DB251DB359845CB81
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 034197cf124b041509b3c9cd9f3f6385178867f084db1685cd854f3dfeeb985e
                                          • Instruction ID: 1f68e6ef8da96b0098e5270ad49a028bbcd0e6f0ffba3d36e488d57489e28a76
                                          • Opcode Fuzzy Hash: 034197cf124b041509b3c9cd9f3f6385178867f084db1685cd854f3dfeeb985e
                                          • Instruction Fuzzy Hash: EE51D4B0B503158FEF605A68E8547AF366FDB89314F204836E90AD7395CA2DCC4583D6
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2606e5d130603845539f1c2ac6fff4fec2128033c4e94f5a4103252be95d1d85
                                          • Instruction ID: d9474b8124a64de4cf5d2bd23748e3cbf4b7df79fb6ff07c078bedff277303c5
                                          • Opcode Fuzzy Hash: 2606e5d130603845539f1c2ac6fff4fec2128033c4e94f5a4103252be95d1d85
                                          • Instruction Fuzzy Hash: 8E5108B0B503158FEF605A7CE9547AF266FDB89314F204836E90AD7395CA2DCC4583D6
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fc0cb10040188cbd01cdeb4f195383482fd2b1eef2508ef4efb6c5713b9ca8c6
                                          • Instruction ID: ae1ba9a3350e7b130e91be1b5c0952f9a88c948597122e025b0031c408b99497
                                          • Opcode Fuzzy Hash: fc0cb10040188cbd01cdeb4f195383482fd2b1eef2508ef4efb6c5713b9ca8c6
                                          • Instruction Fuzzy Hash: A4416E31E0071A8FCB60CFA9D980AAEF7F2FF85314F10592AD256D7650D731E8598B91
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e5951885ccefb30b482c0e3b8244dc4682020b4b89e51c8f4ca84dacd0e00783
                                          • Instruction ID: 328c00a1e83c76913a4556dace6db3bf0482c53ddf45d1a913b60c70f199ff54
                                          • Opcode Fuzzy Hash: e5951885ccefb30b482c0e3b8244dc4682020b4b89e51c8f4ca84dacd0e00783
                                          • Instruction Fuzzy Hash: B231A370E103168BDF748B69CAC077EB7B3FB85328F24992AD459DB281C635D941CB91
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 88fcafb0abf2eb0d37d166c6562aae897b5b4a26306ed0afe58cf924c8689125
                                          • Instruction ID: 03e06cce28dd7aa5dd9232c588a84cfd36ae92fe0991f2391d895c74343d5d52
                                          • Opcode Fuzzy Hash: 88fcafb0abf2eb0d37d166c6562aae897b5b4a26306ed0afe58cf924c8689125
                                          • Instruction Fuzzy Hash: 9C31C630A1031A9FCF54DF65D890ADEBBBAFF45304F108929E505E7200EBB4E846CB91
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b5189590c8f9aec787fcc830d9e2953306d9bf97278d8224095ac44b8055a54d
                                          • Instruction ID: b7d6c1b85b28e6d557b79939b8a38bed3632be4f07d3f9236b95194f6db9ff29
                                          • Opcode Fuzzy Hash: b5189590c8f9aec787fcc830d9e2953306d9bf97278d8224095ac44b8055a54d
                                          • Instruction Fuzzy Hash: 3331A530E102169FDB54DF65C854A9EB7B2FF85304F10C529E916E7350DB71AD46CB50
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f7a9dca62829f071cc8a5df287382554d75a12a770555f50729f27956ee57edf
                                          • Instruction ID: ef51f64921b167c4c405e0f712e520a4eacc24ec75a027f32206156840e0244b
                                          • Opcode Fuzzy Hash: f7a9dca62829f071cc8a5df287382554d75a12a770555f50729f27956ee57edf
                                          • Instruction Fuzzy Hash: 73316F30E102169FDB58CFA5C854A9EB7B2EF89304F10C529EA1AE7350DB71AD86CB50
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 56d892ea6e3135e4ac33f390ee38974b13dc61cbbded5740520cb2c1c94aebc7
                                          • Instruction ID: 49b25d8d09ca8c9d1cca29cbb2fe8c6e3255ead96ce22c334b25b1caac0c7fdc
                                          • Opcode Fuzzy Hash: 56d892ea6e3135e4ac33f390ee38974b13dc61cbbded5740520cb2c1c94aebc7
                                          • Instruction Fuzzy Hash: 9931DF35F003169FDB10CF69E980ADEBBF6EB48214F148029E504E7390E738DD428B91
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cd8a6adabb1cc42443b94a4cabb022af8618a556101766e531c84c7b29650eeb
                                          • Instruction ID: 775f6905d854044ba39d8b3585f47c0d37ac11787a05fa1f53ff868d0be55110
                                          • Opcode Fuzzy Hash: cd8a6adabb1cc42443b94a4cabb022af8618a556101766e531c84c7b29650eeb
                                          • Instruction Fuzzy Hash: 58216D75F002169FEB50DF69D980AEEB7F6EB48614F208025E905E7350EB38DD428B95
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f48a73a6b4fe18251ff488472a9c45ae6e909805155e51ca708c22e1d70817b9
                                          • Instruction ID: 76d8d026fb053279e7765ec2561a09907674777e6a7187fc268a67dab3927e52
                                          • Opcode Fuzzy Hash: f48a73a6b4fe18251ff488472a9c45ae6e909805155e51ca708c22e1d70817b9
                                          • Instruction Fuzzy Hash: 5321A170E002299FCBA4DF68D8405EEF7F6EF88314F10996AD14AE7200DA35D941CFA0
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3279102755.00000000014DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014DD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_14dd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a21d241b3059d49d788b7e5ca0d2743651053ea9970599ecf5b1106eca9c869b
                                          • Instruction ID: 52586dcf548819b09710948fa4c98bf998933fbd2972cfcf42297eb3d2f4e7cc
                                          • Opcode Fuzzy Hash: a21d241b3059d49d788b7e5ca0d2743651053ea9970599ecf5b1106eca9c869b
                                          • Instruction Fuzzy Hash: A6213AB1904204DFCF16CF68C9D4B16BB65FB84318F20C56ED9490B3A2C73AD447CA61
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ab8790389809bcc551c14c5f6f0136638846b0e891b431b0e5bb92a73d1ca79
                                          • Instruction ID: e18113f00418bcd2e53242e5910e08d49ba65d05037b00b62f0e9cd569cca697
                                          • Opcode Fuzzy Hash: 1ab8790389809bcc551c14c5f6f0136638846b0e891b431b0e5bb92a73d1ca79
                                          • Instruction Fuzzy Hash: 1D219030B1022A9BDF44EB69E854B9EB7B7EB84314F209139D505E7340EB35EC458B85
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 08a1cc33cbe2fc28326c2479fa165cf472c5f51ca3bb9e61e3d19a2cf0202d0e
                                          • Instruction ID: 0116f17f0c9402cece93296e54c8288b6907e5a3f15ea7fa41c666e7f43044fc
                                          • Opcode Fuzzy Hash: 08a1cc33cbe2fc28326c2479fa165cf472c5f51ca3bb9e61e3d19a2cf0202d0e
                                          • Instruction Fuzzy Hash: 4B112931B003221FCB519A3DEC14B6EB7DAEB87254F048475E50EC7251DA25DD06C791
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d110b4ae87e64cee1e8391edf8986f68496d551e12914f6cc5995c413cb7dd24
                                          • Instruction ID: f6f3a77a8177155d3560a40260b9b24d9278830ee0f867382c290a2c2ff3750a
                                          • Opcode Fuzzy Hash: d110b4ae87e64cee1e8391edf8986f68496d551e12914f6cc5995c413cb7dd24
                                          • Instruction Fuzzy Hash: 60114532B002258FCB649AAED840B5AB7DBDFC5314F20843AE14AC7390DE20CC0283D1
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b868811759cffdb8dadcd5fbfb339515219ab49312014af4fcfdd806d4ea815
                                          • Instruction ID: 90f8154717e6328ca7d5c75c170dcc51a191ede753a82a8ceaf9e60c77eae758
                                          • Opcode Fuzzy Hash: 2b868811759cffdb8dadcd5fbfb339515219ab49312014af4fcfdd806d4ea815
                                          • Instruction Fuzzy Hash: 8111A136B101258FDB48D678C914AAE73FBEBC8715B008539C50AE7380EE65DC468BD2
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c7ae2715cd8dc7d42c59bad491eae3500db44385b261c82ded39f6749e91c7bf
                                          • Instruction ID: bbd49024932be0ae63b4855c79b98db1a700eeacb3805678d20b0429538b1282
                                          • Opcode Fuzzy Hash: c7ae2715cd8dc7d42c59bad491eae3500db44385b261c82ded39f6749e91c7bf
                                          • Instruction Fuzzy Hash: 62012476B002211FCB228A3DE865BAA7BE7DBC6614F11583AE20AC7341DA24CD468791
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a3e09b93f243b650aae627582724b0d338a758a1ca6c32a37abc00fdfea0c6b1
                                          • Instruction ID: 389203dc54e7af671effa8c21ced56f0779ec92ce2c4f0b9c676c472c432cc30
                                          • Opcode Fuzzy Hash: a3e09b93f243b650aae627582724b0d338a758a1ca6c32a37abc00fdfea0c6b1
                                          • Instruction Fuzzy Hash: 0F019232B102259BDBA49A69CC506EB73EBEFC8714B044439D58AD7280EE659C464792
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ec526bfe85947a368ff904ded17c4e28f3805e11fe3c606a8061f8ab83db7227
                                          • Instruction ID: 829273f52aa2c67937e99aa4a0f645bdbbb9c3a9273f282a34a9179daba2df2c
                                          • Opcode Fuzzy Hash: ec526bfe85947a368ff904ded17c4e28f3805e11fe3c606a8061f8ab83db7227
                                          • Instruction Fuzzy Hash: 6021F4B5C00269AFCB00DF9AD884ADEFFB4FF49310F10852AE518A3200C378A944CFA4
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3279102755.00000000014DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014DD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_14dd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction ID: 7bc8db20a128330901326ab9b04c2df05db8c76eb4c843418144669b885198c7
                                          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction Fuzzy Hash: 2211BE75904244CFDB16CF64C5D4B16BFA1FB88318F24C6AAD9494B3A3C33AD44ACB62
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a523de89a1d699bc4e25630f79ec6890d0da0092bae3fb47cc65ee5a12ba78e3
                                          • Instruction ID: 1bcac6cc0ecde1887d4f71090fb4d18f2267c6d92f90058a787a444c26278d28
                                          • Opcode Fuzzy Hash: a523de89a1d699bc4e25630f79ec6890d0da0092bae3fb47cc65ee5a12ba78e3
                                          • Instruction Fuzzy Hash: 5211D3B5D01259AFCB00DF9AD884ADEFFB4FF49310F10852AE518A7200C378A944CFA5
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c590fc3ad05769e8963c5d29d8fd1100a66be680a6eadc878b2b59302d0b172d
                                          • Instruction ID: a89132aa58dca24ab98de02ef7bec03e2f7da5e5a1ccf44b6b27053d5d02ae6f
                                          • Opcode Fuzzy Hash: c590fc3ad05769e8963c5d29d8fd1100a66be680a6eadc878b2b59302d0b172d
                                          • Instruction Fuzzy Hash: 5601D172B101228BDBA4D6AED454B2BA3DBDBC9718F10843AE60EC7394DD65DC0243D5
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ab2fd58555ca1a72536867b62592a1753162045df535ff9f389ec418d6265568
                                          • Instruction ID: 169d05b47ce24f11ac043d39de6e9ddb000e8621eac7ff423aca33ba9d39e9cb
                                          • Opcode Fuzzy Hash: ab2fd58555ca1a72536867b62592a1753162045df535ff9f389ec418d6265568
                                          • Instruction Fuzzy Hash: 4301F476B001220BCB65DA6DD854B2FB3EBEBC9718F108839E60BC7340EE25DD464785
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 33c9ba76e395ffccbb19eff2e3e920c7a275288ed6e2d06a925de3367f3c5fe4
                                          • Instruction ID: 040617446579eef2934e7d09624ba1378af2b6395f418bebd66e56ec6f2c9f34
                                          • Opcode Fuzzy Hash: 33c9ba76e395ffccbb19eff2e3e920c7a275288ed6e2d06a925de3367f3c5fe4
                                          • Instruction Fuzzy Hash: C1018131B002254FCB50EA2DD858B2E73D6FB8A754F148839E50EC7350EA25DC428785
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 98ef8b7eeba50bcbbc09a1df2ab1f3b0ca59c3917bac450126feb60e9a1ca1e6
                                          • Instruction ID: de04addb0b9cde5fa1281b84110479c5341684993d8ac34732eff6c27a580d88
                                          • Opcode Fuzzy Hash: 98ef8b7eeba50bcbbc09a1df2ab1f3b0ca59c3917bac450126feb60e9a1ca1e6
                                          • Instruction Fuzzy Hash: 3A018631E102259BCB589A69E850ADDB766FB85754F108439D505EB340DA75AC048BC4
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9448f6503935415d73bca83a4f2820d87455bfecb542bae154ae38eb395e0f07
                                          • Instruction ID: 6f6956f652fd28b1da6d4c847675bf4a1d2dda0f402ad43dc96c3589c7c22dde
                                          • Opcode Fuzzy Hash: 9448f6503935415d73bca83a4f2820d87455bfecb542bae154ae38eb395e0f07
                                          • Instruction Fuzzy Hash: 65E0D870E0A3596FDF60DAF08D5576E376EFB42308F2489A6D444CB142E176CE0687D1
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f754edd0074c258688e7cdcfbf44ec467a66221184b934562245730bfae83073
                                          • Instruction ID: 225a4ad1ba60d357df940faf683c096f12bfb8e3e35eae475c9a695a9b7013ee
                                          • Opcode Fuzzy Hash: f754edd0074c258688e7cdcfbf44ec467a66221184b934562245730bfae83073
                                          • Instruction Fuzzy Hash: 05E0423500E3C09FD7579B3098646A13FB56F03209B5A15DBD4918E1E3D729890AD762
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-2843079600
                                          • Opcode ID: 415d1944fea45b7facf883d03b931b8db7a2abde018e0424b90616e00339f8e0
                                          • Instruction ID: 13c13769ecfb7065f47cf0dde0082e138d55670bc151e9d856d0d6ba4cd333a8
                                          • Opcode Fuzzy Hash: 415d1944fea45b7facf883d03b931b8db7a2abde018e0424b90616e00339f8e0
                                          • Instruction Fuzzy Hash: C2121D30A0032A8FDF64DF69C994A9DB7F6FF88704F209569D409AB254DB349D85CF81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-1273862796
                                          • Opcode ID: 94321e2241c4102f4ba2fd3093fe59a072b407e20e3104c8c7c7c0292c3cd170
                                          • Instruction ID: ead3c61eb5a830549bb61e98c8d21df0f312c933b86706c987c2587cbfeeb2e8
                                          • Opcode Fuzzy Hash: 94321e2241c4102f4ba2fd3093fe59a072b407e20e3104c8c7c7c0292c3cd170
                                          • Instruction Fuzzy Hash: E591AE70A0031A9FDB68EF69DA94BAE77F7EF84704F109839D4419B254DB389C45CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-981061697
                                          • Opcode ID: 780516fcb1da9af14775616ebfcf1b9728d10f576d06f499eba3249e88daaff0
                                          • Instruction ID: 38ccf85c35636689cd4fa7c54268a09d57e9b96410891e2333b4bbd124a2ace8
                                          • Opcode Fuzzy Hash: 780516fcb1da9af14775616ebfcf1b9728d10f576d06f499eba3249e88daaff0
                                          • Instruction Fuzzy Hash: 0FF14A34A01319DFDB58EF69D594A9EB7B7FF84304F248428D4069B364DB389C86CB84
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: 7be5b9fac68cbe84cdede38d387348fe42d3eb8276eafb5285e133a41a592214
                                          • Instruction ID: dce94004e8027d15f2671a9fa1c418ac2424dc88679b53283caa835e64efee56
                                          • Opcode Fuzzy Hash: 7be5b9fac68cbe84cdede38d387348fe42d3eb8276eafb5285e133a41a592214
                                          • Instruction Fuzzy Hash: 1AB12A30B1121A8FDB58EF69D59069EB7A7FF84304F249829D406DB394DB74DC86CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR]q$LR]q$$]q$$]q
                                          • API String ID: 0-3527005858
                                          • Opcode ID: 4b5668d8d5a3dbef3dea92afc393eee008b81ae9561b041abf486a6808b31966
                                          • Instruction ID: 733dc1b476d86aa5663b38904e9b0a09d0b6a6662f4f1b45fb5977ef956d03ce
                                          • Opcode Fuzzy Hash: 4b5668d8d5a3dbef3dea92afc393eee008b81ae9561b041abf486a6808b31966
                                          • Instruction Fuzzy Hash: DB51D130B003169FDB58EF68D980AAA77F6FF88304F109568E4069B365DA34EC45CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000008.00000002.3302247920.0000000006E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E20000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_8_2_6e20000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: 66b378fdad05b0562d92ac9a10e5d5e15765d9bb3dbe025e990d7c0f258004aa
                                          • Instruction ID: 1f0f7d54b36ea87a8bd0f301c930264da2fc87e298b45fbd0bb81c5f7385cc86
                                          • Opcode Fuzzy Hash: 66b378fdad05b0562d92ac9a10e5d5e15765d9bb3dbe025e990d7c0f258004aa
                                          • Instruction Fuzzy Hash: 5A518D34A113269FDF64EF6CD5806ADB3B7EF84218F209939D8459B254DB34DC86CB90

                                          Execution Graph

                                          Execution Coverage:9.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:135
                                          Total number of Limit Nodes:9
                                          execution_graph 26377 6c80fa8 26378 6c81133 26377->26378 26379 6c80fce 26377->26379 26379->26378 26382 6c81228 26379->26382 26385 6c81220 26379->26385 26383 6c8122e PostMessageW 26382->26383 26384 6c81294 26383->26384 26384->26379 26386 6c81228 26385->26386 26387 6c8122e PostMessageW 26385->26387 26386->26387 26388 6c81294 26387->26388 26388->26379 26389 c94668 26390 c9467f 26389->26390 26391 c9468b 26390->26391 26393 c94781 26390->26393 26394 c947a5 26393->26394 26398 c94881 26394->26398 26402 c94890 26394->26402 26400 c948b7 26398->26400 26399 c94994 26399->26399 26400->26399 26406 c944c4 26400->26406 26403 c948b7 26402->26403 26404 c94994 26403->26404 26405 c944c4 CreateActCtxA 26403->26405 26404->26404 26405->26404 26407 c95920 CreateActCtxA 26406->26407 26409 c959e3 26407->26409 26410 6c8353a FindCloseChangeNotification 26411 6c8359f 26410->26411 26365 c9d040 26366 c9d086 GetCurrentProcess 26365->26366 26368 c9d0d8 GetCurrentThread 26366->26368 26369 c9d0d1 26366->26369 26370 c9d10e 26368->26370 26371 c9d115 GetCurrentProcess 26368->26371 26369->26368 26370->26371 26374 c9d14b 26371->26374 26372 c9d173 GetCurrentThreadId 26373 c9d1a4 26372->26373 26374->26372 26375 c9d690 DuplicateHandle 26376 c9d726 26375->26376 26412 c9acb0 26413 c9acbf 26412->26413 26416 c9ada8 26412->26416 26424 c9ad97 26412->26424 26417 c9adb9 26416->26417 26419 c9addc 26416->26419 26417->26419 26432 c9b031 26417->26432 26436 c9b040 26417->26436 26418 c9add4 26418->26419 26420 c9afe0 GetModuleHandleW 26418->26420 26419->26413 26421 c9b00d 26420->26421 26421->26413 26425 c9adb9 26424->26425 26426 c9addc 26424->26426 26425->26426 26430 c9b031 LoadLibraryExW 26425->26430 26431 c9b040 LoadLibraryExW 26425->26431 26426->26413 26427 c9add4 26427->26426 26428 c9afe0 GetModuleHandleW 26427->26428 26429 c9b00d 26428->26429 26429->26413 26430->26427 26431->26427 26433 c9b054 26432->26433 26434 c9b079 26433->26434 26440 c9a130 26433->26440 26434->26418 26437 c9b054 26436->26437 26438 c9a130 LoadLibraryExW 26437->26438 26439 c9b079 26437->26439 26438->26439 26439->26418 26441 c9b220 LoadLibraryExW 26440->26441 26443 c9b299 26441->26443 26443->26434 26444 81afa20 26445 81afa3a 26444->26445 26446 81afa42 26445->26446 26459 6c801a8 26445->26459 26463 6c805c8 26445->26463 26474 6c801b7 26445->26474 26478 6c80236 26445->26478 26481 6c80613 26445->26481 26485 6c8037e 26445->26485 26496 6c80384 26445->26496 26500 6c80483 26445->26500 26504 6c80283 26445->26504 26508 6c80440 26445->26508 26511 6c804cb 26445->26511 26517 6c8012b 26445->26517 26460 6c80a7c 26459->26460 26520 81ae2d0 26460->26520 26464 6c805d5 26463->26464 26528 81ae1e0 26464->26528 26465 6c8054a 26465->26446 26467 6c801c9 26524 81adf98 26467->26524 26469 6c808ab 26532 81ae048 26469->26532 26475 6c801c9 26474->26475 26477 81adf98 ResumeThread 26475->26477 26476 6c80643 26476->26446 26477->26476 26480 81ae1e0 WriteProcessMemory 26478->26480 26479 6c80264 26479->26446 26480->26479 26482 6c80619 26481->26482 26484 81adf98 ResumeThread 26482->26484 26483 6c80643 26483->26446 26484->26483 26486 6c806da 26485->26486 26494 81ae1e0 WriteProcessMemory 26486->26494 26487 6c8054a 26487->26446 26488 6c80180 26488->26446 26488->26487 26489 6c801c9 26488->26489 26491 6c808ab 26488->26491 26493 81adf98 ResumeThread 26489->26493 26490 6c80643 26490->26446 26495 81ae048 Wow64SetThreadContext 26491->26495 26492 6c809c1 26492->26446 26493->26490 26494->26488 26495->26492 26497 6c803ad 26496->26497 26536 81ae120 26497->26536 26501 6c80489 26500->26501 26503 81adf98 ResumeThread 26501->26503 26502 6c80643 26502->26446 26503->26502 26505 6c80290 26504->26505 26507 81ae120 VirtualAllocEx 26505->26507 26506 6c8092b 26507->26506 26510 81ae1e0 WriteProcessMemory 26508->26510 26509 6c80464 26509->26446 26510->26509 26516 81ae048 Wow64SetThreadContext 26511->26516 26512 6c8049a 26513 6c80b37 26512->26513 26515 81adf98 ResumeThread 26512->26515 26514 6c80643 26514->26446 26515->26514 26516->26512 26540 81ae468 26517->26540 26521 81ae31b ReadProcessMemory 26520->26521 26523 6c80a9e 26521->26523 26525 81adfd8 ResumeThread 26524->26525 26527 6c80643 26525->26527 26527->26446 26529 81ae228 WriteProcessMemory 26528->26529 26531 6c80180 26529->26531 26531->26446 26531->26465 26531->26467 26531->26469 26533 81ae08d Wow64SetThreadContext 26532->26533 26535 6c809c1 26533->26535 26535->26446 26537 81ae160 VirtualAllocEx 26536->26537 26539 6c8092b 26537->26539 26541 81ae4f1 26540->26541 26541->26541 26542 81ae656 CreateProcessA 26541->26542 26543 81ae6b3 26542->26543

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 c9d031-c9d0cf GetCurrentProcess 298 c9d0d8-c9d10c GetCurrentThread 294->298 299 c9d0d1-c9d0d7 294->299 300 c9d10e-c9d114 298->300 301 c9d115-c9d149 GetCurrentProcess 298->301 299->298 300->301 302 c9d14b-c9d151 301->302 303 c9d152-c9d16d call c9d618 301->303 302->303 307 c9d173-c9d1a2 GetCurrentThreadId 303->307 308 c9d1ab-c9d20d 307->308 309 c9d1a4-c9d1aa 307->309 309->308
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00C9D0BE
                                          • GetCurrentThread.KERNEL32 ref: 00C9D0FB
                                          • GetCurrentProcess.KERNEL32 ref: 00C9D138
                                          • GetCurrentThreadId.KERNEL32 ref: 00C9D191
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 6471a571f4f94572387c44fbf2341b712c41169aae474b86810fa06b7a6fc2d5
                                          • Instruction ID: af8c3f608c4a7f5263cf5dad4390b32fd537cc1f50077bf46d90fef971cfb8d6
                                          • Opcode Fuzzy Hash: 6471a571f4f94572387c44fbf2341b712c41169aae474b86810fa06b7a6fc2d5
                                          • Instruction Fuzzy Hash: 395188B0901349CFDB14DFA9D948BAEBBF1EF88314F208459E419B7390D779A984CB61

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 316 c9d040-c9d0cf GetCurrentProcess 320 c9d0d8-c9d10c GetCurrentThread 316->320 321 c9d0d1-c9d0d7 316->321 322 c9d10e-c9d114 320->322 323 c9d115-c9d149 GetCurrentProcess 320->323 321->320 322->323 324 c9d14b-c9d151 323->324 325 c9d152-c9d16d call c9d618 323->325 324->325 329 c9d173-c9d1a2 GetCurrentThreadId 325->329 330 c9d1ab-c9d20d 329->330 331 c9d1a4-c9d1aa 329->331 331->330
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00C9D0BE
                                          • GetCurrentThread.KERNEL32 ref: 00C9D0FB
                                          • GetCurrentProcess.KERNEL32 ref: 00C9D138
                                          • GetCurrentThreadId.KERNEL32 ref: 00C9D191
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: d0271a88b3892449996b3a09e1cf8b39e28488db7d06f736628dcf2a59f00f4e
                                          • Instruction ID: 0ba29ce202ab02f281703430413f6b0731e30ad2a682d8f2811d85031e564f46
                                          • Opcode Fuzzy Hash: d0271a88b3892449996b3a09e1cf8b39e28488db7d06f736628dcf2a59f00f4e
                                          • Instruction Fuzzy Hash: FB5167B09013498FDB14DFA9D948BAEBBF1EF88314F208459E419B7350D778A984CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 360 81ae468-81ae4fd 362 81ae4ff-81ae509 360->362 363 81ae536-81ae556 360->363 362->363 364 81ae50b-81ae50d 362->364 368 81ae558-81ae562 363->368 369 81ae58f-81ae5be 363->369 366 81ae50f-81ae519 364->366 367 81ae530-81ae533 364->367 370 81ae51b 366->370 371 81ae51d-81ae52c 366->371 367->363 368->369 372 81ae564-81ae566 368->372 379 81ae5c0-81ae5ca 369->379 380 81ae5f7-81ae6b1 CreateProcessA 369->380 370->371 371->371 373 81ae52e 371->373 374 81ae568-81ae572 372->374 375 81ae589-81ae58c 372->375 373->367 377 81ae576-81ae585 374->377 378 81ae574 374->378 375->369 377->377 381 81ae587 377->381 378->377 379->380 382 81ae5cc-81ae5ce 379->382 391 81ae6ba-81ae740 380->391 392 81ae6b3-81ae6b9 380->392 381->375 384 81ae5d0-81ae5da 382->384 385 81ae5f1-81ae5f4 382->385 386 81ae5de-81ae5ed 384->386 387 81ae5dc 384->387 385->380 386->386 388 81ae5ef 386->388 387->386 388->385 402 81ae742-81ae746 391->402 403 81ae750-81ae754 391->403 392->391 402->403 406 81ae748 402->406 404 81ae756-81ae75a 403->404 405 81ae764-81ae768 403->405 404->405 407 81ae75c 404->407 408 81ae76a-81ae76e 405->408 409 81ae778-81ae77c 405->409 406->403 407->405 408->409 410 81ae770 408->410 411 81ae78e-81ae795 409->411 412 81ae77e-81ae784 409->412 410->409 413 81ae7ac 411->413 414 81ae797-81ae7a6 411->414 412->411 414->413
                                          APIs
                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 081AE69E
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284729235.00000000081A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 081A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_81a0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: a995b961ad63564667967055d0fa41b7d61aaaf424695f42c8783de6a35862fd
                                          • Instruction ID: 94e7ae00f7098495d8eac732132d29c3c40b66675c3206fd606c028185b504f9
                                          • Opcode Fuzzy Hash: a995b961ad63564667967055d0fa41b7d61aaaf424695f42c8783de6a35862fd
                                          • Instruction Fuzzy Hash: FB917BB5D00219CFDF20CFA8C851BEDBBB2BF48315F148569E819A7240EB759985CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 416 c9ada8-c9adb7 417 c9adb9-c9adc6 call c9a0cc 416->417 418 c9ade3-c9ade7 416->418 425 c9adc8 417->425 426 c9addc 417->426 419 c9ade9-c9adf3 418->419 420 c9adfb-c9ae3c 418->420 419->420 427 c9ae49-c9ae57 420->427 428 c9ae3e-c9ae46 420->428 471 c9adce call c9b031 425->471 472 c9adce call c9b040 425->472 426->418 429 c9ae59-c9ae5e 427->429 430 c9ae7b-c9ae7d 427->430 428->427 432 c9ae69 429->432 433 c9ae60-c9ae67 call c9a0d8 429->433 434 c9ae80-c9ae87 430->434 431 c9add4-c9add6 431->426 435 c9af18-c9afd8 431->435 438 c9ae6b-c9ae79 432->438 433->438 436 c9ae89-c9ae91 434->436 437 c9ae94-c9ae9b 434->437 466 c9afda-c9afdd 435->466 467 c9afe0-c9b00b GetModuleHandleW 435->467 436->437 441 c9aea8-c9aeaa call c9a0e8 437->441 442 c9ae9d-c9aea5 437->442 438->434 446 c9aeaf-c9aeb1 441->446 442->441 447 c9aebe-c9aec3 446->447 448 c9aeb3-c9aebb 446->448 450 c9aee1-c9aeee 447->450 451 c9aec5-c9aecc 447->451 448->447 456 c9af11-c9af17 450->456 457 c9aef0-c9af0e 450->457 451->450 452 c9aece-c9aede call c9a0f8 call c9a108 451->452 452->450 457->456 466->467 468 c9b00d-c9b013 467->468 469 c9b014-c9b028 467->469 468->469 471->431 472->431
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00C9AFFE
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: a36389631b593c0bd23eef5c96c994ce7d891972fbc9900321596928ab25ac2c
                                          • Instruction ID: d897372946a18caad62efa56f08f7b1050bef6607193d7f24b1f1502990bff5f
                                          • Opcode Fuzzy Hash: a36389631b593c0bd23eef5c96c994ce7d891972fbc9900321596928ab25ac2c
                                          • Instruction Fuzzy Hash: DF716670A00B058FDB24DF2AD44979ABBF1FF88300F108A2DE45AD7A50DB75E959CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 473 c944c4-c959e1 CreateActCtxA 476 c959ea-c95a44 473->476 477 c959e3-c959e9 473->477 484 c95a53-c95a57 476->484 485 c95a46-c95a49 476->485 477->476 486 c95a59-c95a65 484->486 487 c95a68 484->487 485->484 486->487 489 c95a69 487->489 489->489
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00C959D1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: ea69ba7c35be29c839aced832157d41ac30d9e567a3848f864b00f47752ef6fa
                                          • Instruction ID: 88c3f39f70fd148db3d6c4ac131e4f2f52874999a9b9a786474f2bfde8a4ac44
                                          • Opcode Fuzzy Hash: ea69ba7c35be29c839aced832157d41ac30d9e567a3848f864b00f47752ef6fa
                                          • Instruction Fuzzy Hash: AE4101B0C0061DCBDB25DFAAC848B9EBBF5FF49304F20816AD408AB255DB756946CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 490 c95914-c959e1 CreateActCtxA 492 c959ea-c95a44 490->492 493 c959e3-c959e9 490->493 500 c95a53-c95a57 492->500 501 c95a46-c95a49 492->501 493->492 502 c95a59-c95a65 500->502 503 c95a68 500->503 501->500 502->503 505 c95a69 503->505 505->505
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00C959D1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 457f9d8464c14a5aee8f866998b8af0514a3c65ec4131cd4118fe73dbd069ddd
                                          • Instruction ID: 8d0898b591bc54ee923e355ec83a7134c4374829b255d73cfaebbd73e3749894
                                          • Opcode Fuzzy Hash: 457f9d8464c14a5aee8f866998b8af0514a3c65ec4131cd4118fe73dbd069ddd
                                          • Instruction Fuzzy Hash: 154123B0C00619CBDB25DFA9C888BDEBBF6FF48304F20816AD409AB250DB756946CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 506 81ae1e0-81ae22e 508 81ae23e-81ae27d WriteProcessMemory 506->508 509 81ae230-81ae23c 506->509 511 81ae27f-81ae285 508->511 512 81ae286-81ae2b6 508->512 509->508 511->512
                                          APIs
                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 081AE270
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284729235.00000000081A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 081A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_81a0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 8d919fc3a49f886c8ac4c2c9b5d205f02f8942662d45912851da290f6617ed38
                                          • Instruction ID: e3324483ef82535f3099f2f2ec73fb4710e48884c0d05a5245f1152e4ad2f60c
                                          • Opcode Fuzzy Hash: 8d919fc3a49f886c8ac4c2c9b5d205f02f8942662d45912851da290f6617ed38
                                          • Instruction Fuzzy Hash: 912119B59003499FDB10DFA9C885BEEBBF5FF48310F10842AE919A7250C7789954CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 516 c9d689-c9d724 DuplicateHandle 517 c9d72d-c9d74a 516->517 518 c9d726-c9d72c 516->518 518->517
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C9D717
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 36d4e581277138db563d05b0ca3ae4bdec7f61d5851c95846cb1146acafda67e
                                          • Instruction ID: c66139f613dd18852032ab52f848fec4ccbec1061c4e63986f5714ba07c44c59
                                          • Opcode Fuzzy Hash: 36d4e581277138db563d05b0ca3ae4bdec7f61d5851c95846cb1146acafda67e
                                          • Instruction Fuzzy Hash: 6221E3B59012499FDB10CFAAD585ADEBBF5EB48314F14801AE918B3250C378A951CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 521 81ae048-81ae093 523 81ae0a3-81ae0d3 Wow64SetThreadContext 521->523 524 81ae095-81ae0a1 521->524 526 81ae0dc-81ae10c 523->526 527 81ae0d5-81ae0db 523->527 524->523 527->526
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 081AE0C6
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284729235.00000000081A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 081A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_81a0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 24da39ce5e3ab9741c15508ea253eb4f4a1e1fdc9c97fc20ea3c757bd8025bae
                                          • Instruction ID: ba5e219085144b565e47b2f9f34aad4fb6bbcaa79ffb8de32fac10290e16c2eb
                                          • Opcode Fuzzy Hash: 24da39ce5e3ab9741c15508ea253eb4f4a1e1fdc9c97fc20ea3c757bd8025bae
                                          • Instruction Fuzzy Hash: 562134B59002098FDB10DFAAC5857AEBBF4EF88310F14842AD419A7240CB78A984CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 531 81ae2d0-81ae35d ReadProcessMemory 534 81ae35f-81ae365 531->534 535 81ae366-81ae396 531->535 534->535
                                          APIs
                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 081AE350
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284729235.00000000081A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 081A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_81a0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: f02f35f1e84ff487232747fa11c8f8472275e896a06d01aeaf7ea6d350256384
                                          • Instruction ID: 44c5698e81414b04c69f5dd11620f23fc638b6cc928d1946c02564885eba6d96
                                          • Opcode Fuzzy Hash: f02f35f1e84ff487232747fa11c8f8472275e896a06d01aeaf7ea6d350256384
                                          • Instruction Fuzzy Hash: 572109B5C003499FCB10DFAAC885AEEFBF5FF48310F548429E519A7250C7799554CBA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 539 c9d690-c9d724 DuplicateHandle 540 c9d72d-c9d74a 539->540 541 c9d726-c9d72c 539->541 541->540
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00C9D717
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 480e5740ebc7ce0a2bd9c05f9bd31d888f849ada1180ac49f668e6667f4b45f2
                                          • Instruction ID: 1067915750fc85759654ab34083f5c705ffce0d69f6ba11550b796069093d1dc
                                          • Opcode Fuzzy Hash: 480e5740ebc7ce0a2bd9c05f9bd31d888f849ada1180ac49f668e6667f4b45f2
                                          • Instruction Fuzzy Hash: 4721E4B59002489FDB10CF9AD584ADEBBF9FB48310F14801AE918B3350C378A950CFA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 544 c9a130-c9b260 546 c9b268-c9b297 LoadLibraryExW 544->546 547 c9b262-c9b265 544->547 548 c9b299-c9b29f 546->548 549 c9b2a0-c9b2bd 546->549 547->546 548->549
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C9B079,00000800,00000000,00000000), ref: 00C9B28A
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 28c5678f92654b64487d4e85ccb900668d3708d70bbd6bd7ac2bb6db080b4704
                                          • Instruction ID: c5b84f7f5f84ab20937a5a163e7ea30903652e2340c87d5481ed7512ee06b7b6
                                          • Opcode Fuzzy Hash: 28c5678f92654b64487d4e85ccb900668d3708d70bbd6bd7ac2bb6db080b4704
                                          • Instruction Fuzzy Hash: 281126B68007099FCB10DF9AD548BDEFBF5EB48710F10842ED919A7250C379A945CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 552 c9b219-c9b260 553 c9b268-c9b297 LoadLibraryExW 552->553 554 c9b262-c9b265 552->554 555 c9b299-c9b29f 553->555 556 c9b2a0-c9b2bd 553->556 554->553 555->556
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00C9B079,00000800,00000000,00000000), ref: 00C9B28A
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: dd1affe5030cc5ed8592327bdae17c66740c3161de95967d91e58f552fd4799c
                                          • Instruction ID: f8e954185eda4697b1e99d2276227b4e42c434eba011a5b46b6c9d3f59b36f58
                                          • Opcode Fuzzy Hash: dd1affe5030cc5ed8592327bdae17c66740c3161de95967d91e58f552fd4799c
                                          • Instruction Fuzzy Hash: 131126B68006499FCB10CFAAD544BDEFBF4EF88710F14842AD519A7240C779A945CFA4
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 081AE18E
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284729235.00000000081A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 081A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_81a0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 2ae75d2ce4c5281496ed9f0dcdd8f4921fb6a32724be0e17bc0ba745d6025174
                                          • Instruction ID: 484739d3f9e724ffe2d950e853ab73665b83ab383cb5a725251a18378975674a
                                          • Opcode Fuzzy Hash: 2ae75d2ce4c5281496ed9f0dcdd8f4921fb6a32724be0e17bc0ba745d6025174
                                          • Instruction Fuzzy Hash: D81137B59002499FCB10DFAAC845BEEBFF5EF88310F248819E519A7250CB79A550CFA1
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,06C833E9,?,?), ref: 06C83590
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284339737.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6c80000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: c041c786a2fcefe6e83c096278211a6aeba7956c570fddd371254e901fd48944
                                          • Instruction ID: 6b037d441daec896f067bc4103e9ac899c83353b505a63e845859cc2e1ca4926
                                          • Opcode Fuzzy Hash: c041c786a2fcefe6e83c096278211a6aeba7956c570fddd371254e901fd48944
                                          • Instruction Fuzzy Hash: 431136B1C00349CFCB20EF9AC445BEEBBF4EB58320F208429D958A7240D738A644CFA5
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,06C833E9,?,?), ref: 06C83590
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284339737.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6c80000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: b0fc3a21da9f3fd6064dc233bda6bd025a6b8ed30b8306b82e1c1fcabe0c554a
                                          • Instruction ID: 8b42a2c2dcb7fcb45b07bfd50cf95b75703a53981dbf95162d033f8c7f256618
                                          • Opcode Fuzzy Hash: b0fc3a21da9f3fd6064dc233bda6bd025a6b8ed30b8306b82e1c1fcabe0c554a
                                          • Instruction Fuzzy Hash: 431136B58007498FDB20DF9AC445BEEFBF4EB48324F148469D958A7340D778AA44CFA5
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,06C833E9,?,?), ref: 06C83590
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284339737.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6c80000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: f17e3d53bf7e76038ed0bfbd7614b2c1710a8c4e511e8495e8468978fb62d68d
                                          • Instruction ID: 8965aa3dc92b9b1a4da87e617240d4317b1e5a2afceabd0d083e9dbbc3b275df
                                          • Opcode Fuzzy Hash: f17e3d53bf7e76038ed0bfbd7614b2c1710a8c4e511e8495e8468978fb62d68d
                                          • Instruction Fuzzy Hash: 8C1125B58007498FDB60DF9AC445BEEBBF4EB48324F148469D958A7240D738AA44CFA5
                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 06C81285
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284339737.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6c80000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 2bfa75687e009e966ee24efa66d59bfd8e7907d071c7a4924b793cfb5e00b18a
                                          • Instruction ID: 6b9cfc71b7b0d4ebbb7c5247728aa1d89a85efa2f3dfc6e2c6c77d592b71a774
                                          • Opcode Fuzzy Hash: 2bfa75687e009e966ee24efa66d59bfd8e7907d071c7a4924b793cfb5e00b18a
                                          • Instruction Fuzzy Hash: 691106B58003499FDB10DF99C849BEEFBF8FB49314F148419E918A7640C379A944CFA1
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284729235.00000000081A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 081A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_81a0000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 02030618d39b1de1bdf90285fbd32e909b8f3fc2a8d69deddedddd1697b19107
                                          • Instruction ID: 774bbe7b8d2a22a5e6d527272a5d864c7e550ccef6cd3345bc79d2dcbaf6df3f
                                          • Opcode Fuzzy Hash: 02030618d39b1de1bdf90285fbd32e909b8f3fc2a8d69deddedddd1697b19107
                                          • Instruction Fuzzy Hash: 1B1136B5D003488FCB20DFAAC4457EEFBF5EF88324F248819D519A7240CB79A944CBA4
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00C9AFFE
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273983401.0000000000C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C90000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_c90000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: a37d6e99358a071ee899aa0f47f441732a8645b43deccbe1f36b2e9043706dd8
                                          • Instruction ID: 28e009c933c8fdf3271ea243c084c338155ef4ee53a17657bdfe8133b6f84a99
                                          • Opcode Fuzzy Hash: a37d6e99358a071ee899aa0f47f441732a8645b43deccbe1f36b2e9043706dd8
                                          • Instruction Fuzzy Hash: 8D1113B5C002498FCB10CF9AD444BDEFBF4EF88314F10841AD429A7210C379A545CFA1
                                          APIs
                                          • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,06C833E9,?,?), ref: 06C83590
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284339737.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6c80000_mpTrle.jbxd
                                          Similarity
                                          • API ID: ChangeCloseFindNotification
                                          • String ID:
                                          • API String ID: 2591292051-0
                                          • Opcode ID: da21375bab72fb2087066e4e2cba770146cf50cac9ff7ac9459f3ee886f64a0f
                                          • Instruction ID: 6c8f8b05f6478e56dfce37e8aeb993dc5c3149885beafbd3c1aeefcef327776b
                                          • Opcode Fuzzy Hash: da21375bab72fb2087066e4e2cba770146cf50cac9ff7ac9459f3ee886f64a0f
                                          • Instruction Fuzzy Hash: 4A1115B58007498FCB20DF99D545BEEBBF4EF48320F24842AD958A7240D739A684CFA5
                                          APIs
                                          • PostMessageW.USER32(?,?,?,?), ref: 06C81285
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2284339737.0000000006C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C80000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_6c80000_mpTrle.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 260b535e0aaf26b408a5329d3b64d4fe905fe8c6d59febead8c555a6bf9ff32b
                                          • Instruction ID: d67c4faf9c4b28ade77cbe74ca9c02031d154769f9678bb9d1c0a2632acfbf88
                                          • Opcode Fuzzy Hash: 260b535e0aaf26b408a5329d3b64d4fe905fe8c6d59febead8c555a6bf9ff32b
                                          • Instruction Fuzzy Hash: 8111E5B58003499FDB10DF9AC849BDEFBF8FB49314F148419E518A7640C379A544CFA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273535960.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_bbd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 37c55e59466f6a46398f89f57d054a78dc5f4b587d9125e255a49a9fff2f900b
                                          • Instruction ID: d56afb9dfdcf783028cc3e9cfc3796592aa9b8f642e4a16539feede98c7ceaef
                                          • Opcode Fuzzy Hash: 37c55e59466f6a46398f89f57d054a78dc5f4b587d9125e255a49a9fff2f900b
                                          • Instruction Fuzzy Hash: A021F171504284DFCB05DF54D9C0B6ABFA5FB88310F20C6A9E9090A256D3BAD816DBA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273535960.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_bbd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac39c960527bbb7a52ce8c5b7b6571bf62618d35e4338d17ad9b7763663cc51f
                                          • Instruction ID: 9c86093e3ad06bf4b8798a604a8191bdfd81c188e6f755a4cc0eaca39d82b984
                                          • Opcode Fuzzy Hash: ac39c960527bbb7a52ce8c5b7b6571bf62618d35e4338d17ad9b7763663cc51f
                                          • Instruction Fuzzy Hash: 40213071500200DFCB25DF14C9C0F76BFA5FBA8318F20C5A9E8090B256D37AD806CAA2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273616806.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_bcd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 65b05a219e3de1c52bc5e850b9fcae1fb851a34fea5ff22ec95ada4f172aa9c5
                                          • Instruction ID: 8b2df586ad4d014727df865710394651fcef89dacf82f87b616b85a3a017fe70
                                          • Opcode Fuzzy Hash: 65b05a219e3de1c52bc5e850b9fcae1fb851a34fea5ff22ec95ada4f172aa9c5
                                          • Instruction Fuzzy Hash: 6A21D079604204DFCB14DF28D9D4F26BBA5FB88314F20C5BDD94A4B296C33AD807CA62
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273616806.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_bcd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d2c587855a8f7fb05ea2e38b44b89137cd0a698a5e7da7caf1c03c2c0cd110e0
                                          • Instruction ID: 43582a7543320527a79828a9a870b7bd284892e413d302d49aafdda9aedf006b
                                          • Opcode Fuzzy Hash: d2c587855a8f7fb05ea2e38b44b89137cd0a698a5e7da7caf1c03c2c0cd110e0
                                          • Instruction Fuzzy Hash: 15210479604204EFDB05DF24D9C0F26BBA5FB88314F24C5BDE9494F296C33AD806CA61
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273616806.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_bcd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d04e2f578b0a83c40d45c6dd09f6d4b5810907dc0c7e1cbd5e0c975d376ed0f
                                          • Instruction ID: f0346c4ed1679d506d7ed937d20db3168cde1d1023057d47f6a4b5be45cb8875
                                          • Opcode Fuzzy Hash: 5d04e2f578b0a83c40d45c6dd09f6d4b5810907dc0c7e1cbd5e0c975d376ed0f
                                          • Instruction Fuzzy Hash: 3F21A4795093808FCB12CF24D594B15BFB1EB46314F28C5EED8498B697C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273535960.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_bbd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                                          • Instruction ID: ad34bbac5e4cdeb48f085d40ae832ce12f64a52b2c01471040026bc021607531
                                          • Opcode Fuzzy Hash: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                                          • Instruction Fuzzy Hash: 1221B476504280DFDB06CF50D9C4B66BFB1FB84314F24C6A9DD490B656C37AD41ACBA1
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273535960.0000000000BBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BBD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_bbd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                          • Instruction ID: 5761d4e3ce2f07aeefc9c8d889903d84fb4a1b2890b18bad38c97cea66330807
                                          • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                                          • Instruction Fuzzy Hash: 7D11E676504280CFCB16CF14D5C4B66BFB1FBA8314F24C6E9D9490B656C33AD85ACBA2
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2273616806.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_bcd000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction ID: 32ba1e480b97ea44227a5a6274889de3d816e0ced5d218833cfaa098f8efb2a0
                                          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction Fuzzy Hash: DC118B7A604280DFDB16CF14D9C4B15BBA1FB84314F24C6AED8494F696C33AD84ACB62

                                          Execution Graph

                                          Execution Coverage:10.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:0%
                                          Total number of Nodes:112
                                          Total number of Limit Nodes:14
                                          execution_graph 38348 6e43090 38349 6e430d6 GetCurrentProcess 38348->38349 38351 6e43121 38349->38351 38352 6e43128 GetCurrentThread 38349->38352 38351->38352 38353 6e43165 GetCurrentProcess 38352->38353 38354 6e4315e 38352->38354 38355 6e4319b 38353->38355 38354->38353 38360 6e43260 38355->38360 38365 6e43270 38355->38365 38356 6e431c3 GetCurrentThreadId 38357 6e431f4 38356->38357 38361 6e4323a 38360->38361 38362 6e4326a 38360->38362 38361->38356 38369 6e42e54 38362->38369 38366 6e43275 38365->38366 38367 6e42e54 DuplicateHandle 38366->38367 38368 6e4329e 38367->38368 38368->38356 38370 6e432d8 DuplicateHandle 38369->38370 38371 6e4329e 38370->38371 38371->38356 38372 3130848 38374 313084e 38372->38374 38373 313091b 38374->38373 38379 31313a0 38374->38379 38383 313138f 38374->38383 38387 6e41f88 38374->38387 38391 6e41f78 38374->38391 38381 31313a6 38379->38381 38380 31314ba 38380->38374 38381->38380 38395 3138258 38381->38395 38385 3131393 38383->38385 38384 31314ba 38384->38374 38385->38384 38386 3138258 2 API calls 38385->38386 38386->38385 38388 6e41f8d 38387->38388 38408 6e417c4 38388->38408 38392 6e41f88 38391->38392 38393 6e417c4 3 API calls 38392->38393 38394 6e41fb8 38393->38394 38394->38374 38396 3138262 38395->38396 38397 313827c 38396->38397 38400 6e6fa30 38396->38400 38404 6e6fa1f 38396->38404 38397->38381 38402 6e6fa45 38400->38402 38401 6e6fc5a 38401->38397 38402->38401 38403 6e6fc70 GlobalMemoryStatusEx GlobalMemoryStatusEx 38402->38403 38403->38402 38406 6e6fa30 38404->38406 38405 6e6fc5a 38405->38397 38406->38405 38407 6e6fc70 GlobalMemoryStatusEx GlobalMemoryStatusEx 38406->38407 38407->38406 38409 6e417cf 38408->38409 38412 6e42f24 38409->38412 38411 6e4393e 38411->38411 38413 6e42f2f 38412->38413 38414 6e44064 38413->38414 38416 6e45ce8 38413->38416 38414->38411 38417 6e45d09 38416->38417 38418 6e45d2d 38417->38418 38420 6e45e98 38417->38420 38418->38414 38421 6e45ea5 38420->38421 38422 6e45ede 38421->38422 38424 6e43e30 38421->38424 38422->38418 38426 6e43e3b 38424->38426 38425 6e45f50 38426->38425 38428 6e449a8 38426->38428 38429 6e449b3 38428->38429 38435 6e449b8 38429->38435 38431 6e45fbf 38439 6e4b440 38431->38439 38448 6e4b458 38431->38448 38432 6e45ff9 38432->38425 38438 6e449c3 38435->38438 38436 6e473c0 38436->38431 38437 6e45ce8 3 API calls 38437->38436 38438->38436 38438->38437 38441 6e4b489 38439->38441 38442 6e4b589 38439->38442 38440 6e4b495 38440->38432 38441->38440 38457 6e4b6c0 38441->38457 38461 6e4b6d0 38441->38461 38442->38432 38443 6e4b4d5 38464 6e4c9d0 38443->38464 38469 6e4c9c1 38443->38469 38450 6e4b489 38448->38450 38452 6e4b589 38448->38452 38449 6e4b495 38449->38432 38450->38449 38453 6e4b6c0 2 API calls 38450->38453 38454 6e4b6d0 2 API calls 38450->38454 38451 6e4b4d5 38455 6e4c9d0 CreateWindowExW 38451->38455 38456 6e4c9c1 CreateWindowExW 38451->38456 38452->38432 38453->38451 38454->38451 38455->38452 38456->38452 38458 6e4b6d0 38457->38458 38474 6e4b710 38458->38474 38459 6e4b6da 38459->38443 38463 6e4b710 2 API calls 38461->38463 38462 6e4b6da 38462->38443 38463->38462 38465 6e4c9fb 38464->38465 38466 6e4caaa 38465->38466 38482 6e4d8a0 38465->38482 38485 6e4d890 38465->38485 38470 6e4c9fb 38469->38470 38471 6e4caaa 38470->38471 38472 6e4d8a0 CreateWindowExW 38470->38472 38473 6e4d890 CreateWindowExW 38470->38473 38472->38471 38473->38471 38475 6e4b715 38474->38475 38477 6e4b754 38475->38477 38480 6e4b9b8 LoadLibraryExW 38475->38480 38481 6e4b9aa LoadLibraryExW 38475->38481 38476 6e4b74c 38476->38477 38478 6e4b958 GetModuleHandleW 38476->38478 38477->38459 38479 6e4b985 38478->38479 38479->38459 38480->38476 38481->38476 38483 6e4ac8c CreateWindowExW 38482->38483 38484 6e4d8d5 38483->38484 38484->38466 38486 6e4d8a0 38485->38486 38487 6e4ac8c CreateWindowExW 38486->38487 38488 6e4d8d5 38487->38488 38488->38466

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 650 6e63490-6e634b1 651 6e634b3-6e634b6 650->651 652 6e634dc-6e634df 651->652 653 6e634b8-6e634d7 651->653 654 6e634e5-6e63504 652->654 655 6e63c80-6e63c82 652->655 653->652 663 6e63506-6e63509 654->663 664 6e6351d-6e63527 654->664 656 6e63c84 655->656 657 6e63c89-6e63c8c 655->657 656->657 657->651 660 6e63c92-6e63c9b 657->660 663->664 665 6e6350b-6e6351b 663->665 667 6e6352d-6e6353c 664->667 665->667 778 6e6353e call 6e63cb0 667->778 779 6e6353e call 6e63ca8 667->779 669 6e63543-6e63548 670 6e63555-6e63832 669->670 671 6e6354a-6e63550 669->671 692 6e63c72-6e63c7f 670->692 693 6e63838-6e638e7 670->693 671->660 702 6e63910 693->702 703 6e638e9-6e6390e 693->703 705 6e63919-6e6392c 702->705 703->705 707 6e63932-6e63954 call 6e6307c 705->707 708 6e63c59-6e63c65 705->708 707->708 712 6e6395a-6e63964 707->712 708->693 709 6e63c6b 708->709 709->692 712->708 713 6e6396a-6e63975 712->713 713->708 714 6e6397b-6e63a51 713->714 726 6e63a53-6e63a55 714->726 727 6e63a5f-6e63a8f 714->727 726->727 731 6e63a91-6e63a93 727->731 732 6e63a9d-6e63aa9 727->732 731->732 733 6e63aab-6e63aaf 732->733 734 6e63b09-6e63b0d 732->734 733->734 737 6e63ab1-6e63adb 733->737 735 6e63b13-6e63b4f 734->735 736 6e63c4a-6e63c53 734->736 748 6e63b51-6e63b53 735->748 749 6e63b5d-6e63b6b 735->749 736->708 736->714 744 6e63add-6e63adf 737->744 745 6e63ae9-6e63b06 call 6e63088 737->745 744->745 745->734 748->749 752 6e63b82-6e63b8d 749->752 753 6e63b6d-6e63b78 749->753 757 6e63ba5-6e63bb6 752->757 758 6e63b8f-6e63b95 752->758 753->752 756 6e63b7a 753->756 756->752 762 6e63bce-6e63bda 757->762 763 6e63bb8-6e63bbe 757->763 759 6e63b97 758->759 760 6e63b99-6e63b9b 758->760 759->757 760->757 767 6e63bf2-6e63c43 762->767 768 6e63bdc-6e63be2 762->768 764 6e63bc2-6e63bc4 763->764 765 6e63bc0 763->765 764->762 765->762 767->736 769 6e63be6-6e63be8 768->769 770 6e63be4 768->770 769->767 770->767 778->669 779->669
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-3723351465
                                          • Opcode ID: 96f35e9e13c049669159c42b2eb1d1f0d2bc5723977da790060e99dbced5df4a
                                          • Instruction ID: eef0e35f157e2c0379fee43889db55fea3f9ddb366677c2852df4457ef9b3663
                                          • Opcode Fuzzy Hash: 96f35e9e13c049669159c42b2eb1d1f0d2bc5723977da790060e99dbced5df4a
                                          • Instruction Fuzzy Hash: 7E324F30E1071A8FCB54EF75D89459DB7B6FF89304F50D66AE409AB224EB30AD85CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1369 6e67d70-6e67d8e 1370 6e67d90-6e67d93 1369->1370 1371 6e67db4-6e67db7 1370->1371 1372 6e67d95-6e67daf 1370->1372 1373 6e67dc4-6e67dc7 1371->1373 1374 6e67db9-6e67dc3 1371->1374 1372->1371 1376 6e67dea-6e67ded 1373->1376 1377 6e67dc9-6e67de5 1373->1377 1378 6e67e04-6e67e06 1376->1378 1379 6e67def-6e67dfd 1376->1379 1377->1376 1382 6e67e0d-6e67e10 1378->1382 1383 6e67e08 1378->1383 1384 6e67e16-6e67e2c 1379->1384 1387 6e67dff 1379->1387 1382->1370 1382->1384 1383->1382 1389 6e68047-6e68051 1384->1389 1390 6e67e32-6e67e3b 1384->1390 1387->1378 1391 6e68052-6e68060 1390->1391 1392 6e67e41-6e67e5e 1390->1392 1395 6e680b7-6e680be 1391->1395 1396 6e68062-6e68087 1391->1396 1401 6e68034-6e68041 1392->1401 1402 6e67e64-6e67e8c 1392->1402 1397 6e680a3-6e680b3 1395->1397 1398 6e680c0-6e68104 1395->1398 1400 6e68089-6e6808c 1396->1400 1397->1395 1409 6e68295-6e682ab 1398->1409 1410 6e6810a-6e6811b 1398->1410 1403 6e68092-6e680a1 1400->1403 1404 6e682c1-6e682c4 1400->1404 1401->1389 1401->1390 1402->1401 1427 6e67e92-6e67e9b 1402->1427 1403->1397 1403->1398 1406 6e682c6-6e682e2 1404->1406 1407 6e682e7-6e682ea 1404->1407 1406->1407 1412 6e68395-6e68397 1407->1412 1413 6e682f0-6e682fc 1407->1413 1409->1404 1425 6e68280-6e6828f 1410->1425 1426 6e68121-6e6813e 1410->1426 1416 6e6839e-6e683a1 1412->1416 1417 6e68399 1412->1417 1422 6e68307-6e68309 1413->1422 1416->1400 1420 6e683a7-6e683b0 1416->1420 1417->1416 1428 6e68321-6e68325 1422->1428 1429 6e6830b-6e68311 1422->1429 1425->1409 1425->1410 1426->1425 1444 6e68144-6e6823a call 6e66598 1426->1444 1427->1391 1434 6e67ea1-6e67ebd 1427->1434 1432 6e68327-6e68331 1428->1432 1433 6e68333 1428->1433 1430 6e68315-6e68317 1429->1430 1431 6e68313 1429->1431 1430->1428 1431->1428 1435 6e68338-6e6833a 1432->1435 1433->1435 1441 6e68022-6e6802e 1434->1441 1442 6e67ec3-6e67eed 1434->1442 1439 6e6833c-6e6833f 1435->1439 1440 6e6834b-6e68384 1435->1440 1439->1420 1440->1403 1457 6e6838a-6e68394 1440->1457 1441->1401 1441->1427 1455 6e67ef3-6e67f1b 1442->1455 1456 6e68018-6e6801d 1442->1456 1503 6e6823c-6e68246 1444->1503 1504 6e68248 1444->1504 1455->1456 1463 6e67f21-6e67f4f 1455->1463 1456->1441 1463->1456 1469 6e67f55-6e67f5e 1463->1469 1469->1456 1470 6e67f64-6e67f96 1469->1470 1478 6e67fa1-6e67fbd 1470->1478 1479 6e67f98-6e67f9c 1470->1479 1478->1441 1481 6e67fbf-6e68016 call 6e66598 1478->1481 1479->1456 1480 6e67f9e 1479->1480 1480->1478 1481->1441 1505 6e6824d-6e6824f 1503->1505 1504->1505 1505->1425 1506 6e68251-6e68256 1505->1506 1507 6e68264 1506->1507 1508 6e68258-6e68262 1506->1508 1509 6e68269-6e6826b 1507->1509 1508->1509 1509->1425 1510 6e6826d-6e68279 1509->1510 1510->1425
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q
                                          • API String ID: 0-127220927
                                          • Opcode ID: 0993e151f0a7155e21e79c8c40859220e9077f428565ac17519179eae898cda1
                                          • Instruction ID: 93c770b7a74559b7bef9dfca4fda9d243951a7af8c32b81769c6882eacd20415
                                          • Opcode Fuzzy Hash: 0993e151f0a7155e21e79c8c40859220e9077f428565ac17519179eae898cda1
                                          • Instruction Fuzzy Hash: EA02B030B403058FDBA8DF65D494AAEB7E6FF84358F149928E4059B380DB75EC46CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a0db8b364ca5edcaec185c7be8dc4dfc9edbb038511a37351601993f35c8373e
                                          • Instruction ID: 1a200144b14ad73f3050308086f028f8cc3fb6dbf6636eea4dedd9d1435962c0
                                          • Opcode Fuzzy Hash: a0db8b364ca5edcaec185c7be8dc4dfc9edbb038511a37351601993f35c8373e
                                          • Instruction Fuzzy Hash: BE62BD34B103048FDB64DB69D550AADB7F6EF88398F109428E806EB394DB35EC46CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d22db883b532bca562b03430f12031d0917e32f00600f1542c500accd49208d5
                                          • Instruction ID: 9327d6bf18c17ccf0eaaf6dbcab858a417e6bc8ecef54a942fcee5fcdc404fca
                                          • Opcode Fuzzy Hash: d22db883b532bca562b03430f12031d0917e32f00600f1542c500accd49208d5
                                          • Instruction Fuzzy Hash: B332BD30B403098FDB64DB69D880AADB7B6FF88754F209529E445EB350DB38EC46CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 214ff1636f05744e49005465b0585a2b4b4ddca4f19774a3533d2df1f4b65b92
                                          • Instruction ID: 0f6015a11844983f648eb996d612a3fefa41e024dc8698e8df294cecc03c0c79
                                          • Opcode Fuzzy Hash: 214ff1636f05744e49005465b0585a2b4b4ddca4f19774a3533d2df1f4b65b92
                                          • Instruction Fuzzy Hash: 1E12D331F403058BDB64DF65C8906AEB7B2EB85358F24D939E95A9B380DB34DC42CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eb8b2045809ce41e02caeb63dcdaa3b2ff81489dd44aa751ecedcc05e135f8be
                                          • Instruction ID: e24d9919de1eb24115dfa786dd5437ce2db0fb554395e80d59e8b8b754bd0327
                                          • Opcode Fuzzy Hash: eb8b2045809ce41e02caeb63dcdaa3b2ff81489dd44aa751ecedcc05e135f8be
                                          • Instruction Fuzzy Hash: C1228030E503098FEFA4CB6AD4947ADB7B6EB49358F209829E409DB391DB34DC91CB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 526 6e6acc8-6e6ace6 527 6e6ace8-6e6aceb 526->527 528 6e6ad05-6e6ad08 527->528 529 6e6aced-6e6ad00 527->529 530 6e6ad1c-6e6ad1f 528->530 531 6e6ad0a-6e6ad17 528->531 529->528 533 6e6ad21-6e6ad2a 530->533 534 6e6ad39-6e6ad3c 530->534 531->530 536 6e6ad30-6e6ad34 533->536 537 6e6aeff-6e6af36 533->537 538 6e6ad3e-6e6ad5a 534->538 539 6e6ad5f-6e6ad62 534->539 536->534 548 6e6af38-6e6af3b 537->548 538->539 540 6e6ad64-6e6ad6d 539->540 541 6e6ad72-6e6ad75 539->541 540->541 543 6e6aee5-6e6aeee 541->543 544 6e6ad7b-6e6ad7e 541->544 543->533 549 6e6aef4-6e6aefe 543->549 546 6e6ad80-6e6ad85 544->546 547 6e6ad88-6e6ad8b 544->547 546->547 553 6e6ad9c-6e6ad9e 547->553 554 6e6ad8d-6e6ad91 547->554 551 6e6af3d-6e6af41 548->551 552 6e6af48-6e6af4b 548->552 555 6e6af43 551->555 556 6e6af61-6e6af9c 551->556 557 6e6af4d-6e6af57 552->557 558 6e6af58-6e6af5b 552->558 560 6e6ada5-6e6ada8 553->560 561 6e6ada0 553->561 554->549 559 6e6ad97 554->559 555->552 568 6e6afa2-6e6afae 556->568 569 6e6b18f-6e6b1a2 556->569 558->556 562 6e6b1c4-6e6b1c7 558->562 559->553 560->527 563 6e6adae-6e6add2 560->563 561->560 565 6e6b1ea-6e6b1ed 562->565 566 6e6b1c9-6e6b1e5 562->566 580 6e6aee2 563->580 581 6e6add8-6e6ade7 563->581 570 6e6b1ef call 6e6b220 565->570 571 6e6b1fc-6e6b1fe 565->571 566->565 582 6e6afb0-6e6afc9 568->582 583 6e6afce-6e6b012 568->583 574 6e6b1a4 569->574 576 6e6b1f5-6e6b1f7 570->576 572 6e6b205-6e6b208 571->572 573 6e6b200 571->573 572->548 578 6e6b20e-6e6b218 572->578 573->572 574->562 576->571 580->543 587 6e6adff-6e6ae3a call 6e66598 581->587 588 6e6ade9-6e6adef 581->588 582->574 599 6e6b014-6e6b026 583->599 600 6e6b02e-6e6b06d 583->600 605 6e6ae52-6e6ae69 587->605 606 6e6ae3c-6e6ae42 587->606 589 6e6adf3-6e6adf5 588->589 590 6e6adf1 588->590 589->587 590->587 599->600 607 6e6b154-6e6b169 600->607 608 6e6b073-6e6b14e call 6e66598 600->608 618 6e6ae81-6e6ae92 605->618 619 6e6ae6b-6e6ae71 605->619 611 6e6ae46-6e6ae48 606->611 612 6e6ae44 606->612 607->569 608->607 611->605 612->605 625 6e6ae94-6e6ae9a 618->625 626 6e6aeaa-6e6aedb 618->626 620 6e6ae75-6e6ae77 619->620 621 6e6ae73 619->621 620->618 621->618 627 6e6ae9e-6e6aea0 625->627 628 6e6ae9c 625->628 626->580 627->626 628->626
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-1273862796
                                          • Opcode ID: 8f0d7703b80e54887be3a08df8d39e843c0e31b9483c36df7a0a9b66a5cbe7d3
                                          • Instruction ID: 35dbc684c2d5b7bc35794a25962d1fb65f7dce1ae1fcf126f85bca3aba91f1b3
                                          • Opcode Fuzzy Hash: 8f0d7703b80e54887be3a08df8d39e843c0e31b9483c36df7a0a9b66a5cbe7d3
                                          • Instruction Fuzzy Hash: 93E16B30E503098FDB68DF69D8806AEB7B6FF89344F209529E805AB354DB35DC46CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 780 6e6b648-6e6b668 781 6e6b66a-6e6b66d 780->781 782 6e6b684-6e6b687 781->782 783 6e6b66f-6e6b673 781->783 786 6e6b68e-6e6b691 782->786 787 6e6b689-6e6b68b 782->787 784 6e6b9db-6e6ba16 783->784 785 6e6b679-6e6b67f 783->785 796 6e6ba18-6e6ba1b 784->796 785->782 788 6e6b6a3-6e6b6a6 786->788 789 6e6b693 786->789 787->786 790 6e6b6ac-6e6b6af 788->790 791 6e6b81a-6e6b81b 788->791 793 6e6b69b-6e6b69e 789->793 794 6e6b6c6-6e6b6c9 790->794 795 6e6b6b1-6e6b6b5 790->795 797 6e6b820-6e6b823 791->797 793->788 802 6e6b6f0-6e6b6f3 794->802 803 6e6b6cb-6e6b6cf 794->803 795->784 799 6e6b6bb-6e6b6c1 795->799 800 6e6ba3e-6e6ba41 796->800 801 6e6ba1d-6e6ba39 796->801 797->791 798 6e6b825-6e6b828 797->798 805 6e6b845-6e6b848 798->805 806 6e6b82a-6e6b833 798->806 799->794 807 6e6ba47-6e6ba6f 800->807 808 6e6bcad-6e6bcaf 800->808 801->800 809 6e6b716-6e6b719 802->809 810 6e6b6f5-6e6b711 802->810 803->784 804 6e6b6d5-6e6b6e5 803->804 804->791 833 6e6b6eb 804->833 815 6e6b857-6e6b85a 805->815 816 6e6b84a-6e6b850 805->816 806->784 812 6e6b839-6e6b840 806->812 857 6e6ba71-6e6ba74 807->857 858 6e6ba79-6e6babd 807->858 813 6e6bcb6-6e6bcb9 808->813 814 6e6bcb1 808->814 817 6e6b73c-6e6b73f 809->817 818 6e6b71b-6e6b71f 809->818 810->809 812->805 813->796 822 6e6bcbf-6e6bcc8 813->822 814->813 826 6e6b864-6e6b867 815->826 827 6e6b85c-6e6b861 815->827 823 6e6b852 816->823 824 6e6b87c-6e6b882 816->824 819 6e6b741-6e6b744 817->819 820 6e6b749-6e6b74c 817->820 818->784 829 6e6b725-6e6b735 818->829 819->820 831 6e6b74e-6e6b754 820->831 832 6e6b759-6e6b75c 820->832 823->815 824->784 836 6e6b888-6e6b88f 824->836 834 6e6b877-6e6b87a 826->834 835 6e6b869-6e6b872 826->835 827->826 829->803 848 6e6b737 829->848 831->832 837 6e6b773-6e6b776 832->837 838 6e6b75e-6e6b762 832->838 833->802 834->824 841 6e6b894-6e6b897 834->841 835->834 836->841 844 6e6b786-6e6b789 837->844 845 6e6b778-6e6b781 837->845 838->784 843 6e6b768-6e6b76e 838->843 846 6e6b8be-6e6b8c1 841->846 847 6e6b899-6e6b89d 841->847 843->837 851 6e6b78b-6e6b794 844->851 852 6e6b799-6e6b79c 844->852 845->844 849 6e6b8c3-6e6b8d8 846->849 850 6e6b8ff-6e6b902 846->850 847->784 854 6e6b8a3-6e6b8b3 847->854 848->817 849->784 870 6e6b8de-6e6b8fa 849->870 855 6e6b957-6e6b95a 850->855 856 6e6b904-6e6b952 call 6e66598 850->856 851->852 859 6e6b7b2-6e6b7b5 852->859 860 6e6b79e-6e6b7a7 852->860 854->818 867 6e6b8b9 854->867 855->860 863 6e6b960-6e6b963 855->863 856->855 857->822 897 6e6bca2-6e6bcac 858->897 898 6e6bac3-6e6bacc 858->898 865 6e6b7d7-6e6b7da 859->865 866 6e6b7b7-6e6b7d2 859->866 860->806 864 6e6b7ad 860->864 863->816 871 6e6b969-6e6b96c 863->871 864->859 868 6e6b7e7-6e6b7ea 865->868 869 6e6b7dc-6e6b7e2 865->869 866->865 867->846 875 6e6b7ec-6e6b7f5 868->875 876 6e6b7fa-6e6b7fd 868->876 869->868 870->850 877 6e6b9a7-6e6b9aa 871->877 878 6e6b96e-6e6b983 871->878 875->876 876->791 883 6e6b7ff-6e6b802 876->883 881 6e6b9be-6e6b9c0 877->881 882 6e6b9ac-6e6b9b3 877->882 878->784 893 6e6b985-6e6b9a2 878->893 888 6e6b9c7-6e6b9ca 881->888 889 6e6b9c2 881->889 882->875 887 6e6b9b9 882->887 890 6e6b804-6e6b810 883->890 891 6e6b815-6e6b818 883->891 887->881 888->781 896 6e6b9d0-6e6b9da 888->896 889->888 890->891 891->791 891->797 893->877 902 6e6bad2-6e6bb3e call 6e66598 898->902 903 6e6bc98-6e6bc9d 898->903 914 6e6bb44-6e6bb49 902->914 915 6e6bc38-6e6bc4d 902->915 903->897 916 6e6bb65 914->916 917 6e6bb4b-6e6bb51 914->917 915->903 921 6e6bb67-6e6bb6d 916->921 919 6e6bb57-6e6bb59 917->919 920 6e6bb53-6e6bb55 917->920 922 6e6bb63 919->922 920->922 923 6e6bb82-6e6bb8f 921->923 924 6e6bb6f-6e6bb75 921->924 922->921 931 6e6bba7-6e6bbb4 923->931 932 6e6bb91-6e6bb97 923->932 925 6e6bc23-6e6bc32 924->925 926 6e6bb7b 924->926 925->914 925->915 926->923 927 6e6bbb6-6e6bbc3 926->927 928 6e6bbea-6e6bbf7 926->928 940 6e6bbc5-6e6bbcb 927->940 941 6e6bbdb-6e6bbe8 927->941 937 6e6bc0f-6e6bc1c 928->937 938 6e6bbf9-6e6bbff 928->938 931->925 934 6e6bb9b-6e6bb9d 932->934 935 6e6bb99 932->935 934->931 935->931 937->925 942 6e6bc03-6e6bc05 938->942 943 6e6bc01 938->943 944 6e6bbcf-6e6bbd1 940->944 945 6e6bbcd 940->945 941->925 942->937 943->937 944->941 945->941
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-3723351465
                                          • Opcode ID: 16aa250e959a9d927d18c32866f6177cf4ac363a26fdf962e1e0503ab4105bc9
                                          • Instruction ID: 11977a9c03a17dd7366f8a398bdb123f3fca9f04f99b8e7d253db04dac74af1b
                                          • Opcode Fuzzy Hash: 16aa250e959a9d927d18c32866f6177cf4ac363a26fdf962e1e0503ab4105bc9
                                          • Instruction Fuzzy Hash: 0202CC30E5030A8FDBA4CF6AD4806ADB7B6EF85348F10992AE406DB255DB34EC55CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 948 6e4308b-6e4311f GetCurrentProcess 953 6e43121-6e43127 948->953 954 6e43128-6e4315c GetCurrentThread 948->954 953->954 955 6e43165-6e43199 GetCurrentProcess 954->955 956 6e4315e-6e43164 954->956 958 6e431a2-6e431ba 955->958 959 6e4319b-6e431a1 955->959 956->955 970 6e431bd call 6e43260 958->970 971 6e431bd call 6e43270 958->971 959->958 961 6e431c3-6e431f2 GetCurrentThreadId 963 6e431f4-6e431fa 961->963 964 6e431fb-6e4325d 961->964 963->964 970->961 971->961
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 06E4310E
                                          • GetCurrentThread.KERNEL32 ref: 06E4314B
                                          • GetCurrentProcess.KERNEL32 ref: 06E43188
                                          • GetCurrentThreadId.KERNEL32 ref: 06E431E1
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: b4b9dfbadefddd9a677ecdbcdab2990b7c30fedbdf5c2a1ac8e990b2c0fad6f7
                                          • Instruction ID: 7d61e87d7251805a38c982e431c8b8182eea5a6ea248d757c0b20d1c38b25ff3
                                          • Opcode Fuzzy Hash: b4b9dfbadefddd9a677ecdbcdab2990b7c30fedbdf5c2a1ac8e990b2c0fad6f7
                                          • Instruction Fuzzy Hash: B25189B0D003098FDB58DFAAD948BAEBBF1EF48304F208459E409A7350D7345848CFA5

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 972 6e43090-6e4311f GetCurrentProcess 976 6e43121-6e43127 972->976 977 6e43128-6e4315c GetCurrentThread 972->977 976->977 978 6e43165-6e43199 GetCurrentProcess 977->978 979 6e4315e-6e43164 977->979 981 6e431a2-6e431ba 978->981 982 6e4319b-6e431a1 978->982 979->978 993 6e431bd call 6e43260 981->993 994 6e431bd call 6e43270 981->994 982->981 984 6e431c3-6e431f2 GetCurrentThreadId 986 6e431f4-6e431fa 984->986 987 6e431fb-6e4325d 984->987 986->987 993->984 994->984
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 06E4310E
                                          • GetCurrentThread.KERNEL32 ref: 06E4314B
                                          • GetCurrentProcess.KERNEL32 ref: 06E43188
                                          • GetCurrentThreadId.KERNEL32 ref: 06E431E1
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 51476705a54a542c74138b282ea6d70d6bddb209c69f4158cf851d18a4ac6263
                                          • Instruction ID: 387bc3e02925392fcab83e07fcee211aa6a6e3280d846f83dd4738c43baf7af4
                                          • Opcode Fuzzy Hash: 51476705a54a542c74138b282ea6d70d6bddb209c69f4158cf851d18a4ac6263
                                          • Instruction Fuzzy Hash: D65167B0D003098FDB58DFAAD949BAEBBF2EF48314F208059E419A7350D7385948CF65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 995 6e69148-6e6916d 996 6e6916f-6e69172 995->996 997 6e69a30-6e69a33 996->997 998 6e69178-6e6918d 996->998 999 6e69a35-6e69a54 997->999 1000 6e69a59-6e69a5b 997->1000 1005 6e691a5-6e691bb 998->1005 1006 6e6918f-6e69195 998->1006 999->1000 1002 6e69a62-6e69a65 1000->1002 1003 6e69a5d 1000->1003 1002->996 1007 6e69a6b-6e69a75 1002->1007 1003->1002 1012 6e691c6-6e691c8 1005->1012 1008 6e69197 1006->1008 1009 6e69199-6e6919b 1006->1009 1008->1005 1009->1005 1013 6e691e0-6e69251 1012->1013 1014 6e691ca-6e691d0 1012->1014 1025 6e69253-6e69276 1013->1025 1026 6e6927d-6e69299 1013->1026 1015 6e691d4-6e691d6 1014->1015 1016 6e691d2 1014->1016 1015->1013 1016->1013 1025->1026 1031 6e692c5-6e692e0 1026->1031 1032 6e6929b-6e692be 1026->1032 1037 6e692e2-6e69304 1031->1037 1038 6e6930b-6e69326 1031->1038 1032->1031 1037->1038 1043 6e6934b-6e69359 1038->1043 1044 6e69328-6e69344 1038->1044 1045 6e6935b-6e69364 1043->1045 1046 6e69369-6e693e3 1043->1046 1044->1043 1045->1007 1052 6e693e5-6e69403 1046->1052 1053 6e69430-6e69445 1046->1053 1057 6e69405-6e69414 1052->1057 1058 6e6941f-6e6942e 1052->1058 1053->997 1057->1058 1058->1052 1058->1053
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: 2a3e7eb6be5a6c91dfd10568a4610c997aed009b550aa718b9bd2c2115938782
                                          • Instruction ID: 75963aa6d7bf98a4d8ed73dc3697360068a8e01d34269a4897114853c465db94
                                          • Opcode Fuzzy Hash: 2a3e7eb6be5a6c91dfd10568a4610c997aed009b550aa718b9bd2c2115938782
                                          • Instruction Fuzzy Hash: 86916031B4021A8FDB58DF65D850BAEB3FAFF88344F108569D409EB345EE349D468B92

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1061 6e6cf38-6e6cf53 1062 6e6cf55-6e6cf58 1061->1062 1063 6e6cfa1-6e6cfa4 1062->1063 1064 6e6cf5a-6e6cf9c 1062->1064 1065 6e6cfa6-6e6cfb5 1063->1065 1066 6e6cfed-6e6cff0 1063->1066 1064->1063 1067 6e6cfb7-6e6cfbc 1065->1067 1068 6e6cfc4-6e6cfd0 1065->1068 1070 6e6cff2-6e6cff4 1066->1070 1071 6e6cfff-6e6d002 1066->1071 1067->1068 1072 6e6cfd6-6e6cfe8 1068->1072 1073 6e6d955-6e6d98e 1068->1073 1074 6e6d421 1070->1074 1075 6e6cffa 1070->1075 1076 6e6d004-6e6d01a 1071->1076 1077 6e6d01f-6e6d022 1071->1077 1072->1066 1095 6e6d990-6e6d993 1073->1095 1080 6e6d424-6e6d430 1074->1080 1075->1071 1076->1077 1078 6e6d024-6e6d066 1077->1078 1079 6e6d06b-6e6d06e 1077->1079 1078->1079 1082 6e6d0b7-6e6d0ba 1079->1082 1083 6e6d070-6e6d0b2 1079->1083 1086 6e6d436-6e6d723 1080->1086 1087 6e6d17c-6e6d18b 1080->1087 1092 6e6d0bc-6e6d0be 1082->1092 1093 6e6d0c9-6e6d0cc 1082->1093 1083->1082 1274 6e6d94a-6e6d954 1086->1274 1275 6e6d729-6e6d72f 1086->1275 1090 6e6d18d-6e6d192 1087->1090 1091 6e6d19a-6e6d1a6 1087->1091 1090->1091 1091->1073 1103 6e6d1ac-6e6d1be 1091->1103 1101 6e6d0c4 1092->1101 1102 6e6d2df-6e6d2e8 1092->1102 1104 6e6d115-6e6d118 1093->1104 1105 6e6d0ce-6e6d110 1093->1105 1096 6e6d995 call 6e6daad 1095->1096 1097 6e6d9a2-6e6d9a5 1095->1097 1114 6e6d99b-6e6d99d 1096->1114 1106 6e6d9a7-6e6d9c3 1097->1106 1107 6e6d9c8-6e6d9cb 1097->1107 1101->1093 1111 6e6d2f7-6e6d303 1102->1111 1112 6e6d2ea-6e6d2ef 1102->1112 1130 6e6d1c3-6e6d1c6 1103->1130 1109 6e6d161-6e6d164 1104->1109 1110 6e6d11a-6e6d15c 1104->1110 1105->1104 1106->1107 1119 6e6d9fe-6e6da00 1107->1119 1120 6e6d9cd-6e6d9f9 1107->1120 1109->1080 1118 6e6d16a-6e6d16d 1109->1118 1110->1109 1115 6e6d414-6e6d419 1111->1115 1116 6e6d309-6e6d31d 1111->1116 1112->1111 1114->1097 1115->1074 1116->1074 1141 6e6d323-6e6d335 1116->1141 1126 6e6d177-6e6d17a 1118->1126 1127 6e6d16f-6e6d174 1118->1127 1128 6e6da07-6e6da0a 1119->1128 1129 6e6da02 1119->1129 1120->1119 1126->1087 1126->1130 1127->1126 1128->1095 1135 6e6da0c-6e6da1b 1128->1135 1129->1128 1137 6e6d20f-6e6d212 1130->1137 1138 6e6d1c8-6e6d20a 1130->1138 1157 6e6da82-6e6da97 1135->1157 1158 6e6da1d-6e6da80 call 6e66598 1135->1158 1144 6e6d214-6e6d256 1137->1144 1145 6e6d25b-6e6d25e 1137->1145 1138->1137 1163 6e6d337-6e6d33d 1141->1163 1164 6e6d359-6e6d35b 1141->1164 1144->1145 1148 6e6d2a7-6e6d2aa 1145->1148 1149 6e6d260-6e6d2a2 1145->1149 1159 6e6d2ac-6e6d2c8 1148->1159 1160 6e6d2cd-6e6d2cf 1148->1160 1149->1148 1179 6e6da98 1157->1179 1158->1157 1159->1160 1170 6e6d2d6-6e6d2d9 1160->1170 1171 6e6d2d1 1160->1171 1175 6e6d341-6e6d34d 1163->1175 1176 6e6d33f 1163->1176 1173 6e6d365-6e6d371 1164->1173 1170->1062 1170->1102 1171->1170 1193 6e6d373-6e6d37d 1173->1193 1194 6e6d37f 1173->1194 1180 6e6d34f-6e6d357 1175->1180 1176->1180 1179->1179 1180->1173 1199 6e6d384-6e6d386 1193->1199 1194->1199 1199->1074 1201 6e6d38c-6e6d3a8 call 6e66598 1199->1201 1214 6e6d3b7-6e6d3c3 1201->1214 1215 6e6d3aa-6e6d3af 1201->1215 1214->1115 1217 6e6d3c5-6e6d412 1214->1217 1215->1214 1217->1074 1276 6e6d731-6e6d736 1275->1276 1277 6e6d73e-6e6d747 1275->1277 1276->1277 1277->1073 1278 6e6d74d-6e6d760 1277->1278 1280 6e6d766-6e6d76c 1278->1280 1281 6e6d93a-6e6d944 1278->1281 1282 6e6d76e-6e6d773 1280->1282 1283 6e6d77b-6e6d784 1280->1283 1281->1274 1281->1275 1282->1283 1283->1073 1284 6e6d78a-6e6d7ab 1283->1284 1287 6e6d7ad-6e6d7b2 1284->1287 1288 6e6d7ba-6e6d7c3 1284->1288 1287->1288 1288->1073 1289 6e6d7c9-6e6d7e6 1288->1289 1289->1281 1292 6e6d7ec-6e6d7f2 1289->1292 1292->1073 1293 6e6d7f8-6e6d811 1292->1293 1295 6e6d817-6e6d83e 1293->1295 1296 6e6d92d-6e6d934 1293->1296 1295->1073 1299 6e6d844-6e6d84e 1295->1299 1296->1281 1296->1292 1299->1073 1300 6e6d854-6e6d86b 1299->1300 1302 6e6d86d-6e6d878 1300->1302 1303 6e6d87a-6e6d895 1300->1303 1302->1303 1303->1296 1308 6e6d89b-6e6d8b4 call 6e66598 1303->1308 1312 6e6d8b6-6e6d8bb 1308->1312 1313 6e6d8c3-6e6d8cc 1308->1313 1312->1313 1313->1073 1314 6e6d8d2-6e6d926 1313->1314 1314->1296
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q
                                          • API String ID: 0-182748909
                                          • Opcode ID: d758ce86182d6a290a45e8d0796a2ce0a6e4f8d26296546193a746362247f8e5
                                          • Instruction ID: c4dd21f81ddd153711cefb446341062b0bfffccc23d57fd7052b0d5190c37b7f
                                          • Opcode Fuzzy Hash: d758ce86182d6a290a45e8d0796a2ce0a6e4f8d26296546193a746362247f8e5
                                          • Instruction Fuzzy Hash: 16624F3074020A8FCB69DF69DA90A5DB7B6FF84344F609A28D0099F359DB75EC46CB81

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1322 6e64b98-6e64bbc 1323 6e64bbe-6e64bc1 1322->1323 1324 6e64bc7-6e64cbf 1323->1324 1325 6e652a0-6e652a3 1323->1325 1345 6e64cc5-6e64d12 call 6e65440 1324->1345 1346 6e64d42-6e64d49 1324->1346 1326 6e652c4-6e652c6 1325->1326 1327 6e652a5-6e652bf 1325->1327 1328 6e652cd-6e652d0 1326->1328 1329 6e652c8 1326->1329 1327->1326 1328->1323 1331 6e652d6-6e652e3 1328->1331 1329->1328 1359 6e64d18-6e64d34 1345->1359 1347 6e64d4f-6e64dbf 1346->1347 1348 6e64dcd-6e64dd6 1346->1348 1365 6e64dc1 1347->1365 1366 6e64dca 1347->1366 1348->1331 1362 6e64d36 1359->1362 1363 6e64d3f-6e64d40 1359->1363 1362->1363 1363->1346 1365->1366 1366->1348
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: fbq$XPbq$\Obq
                                          • API String ID: 0-4057264190
                                          • Opcode ID: 229f8876870cdeba67175436a4d9e535b9bafc790f7eccd6728f9f7e61a0eb82
                                          • Instruction ID: 48d89af4ed1549fd0d5ac3f10488599351d0b9f9faffc86ced1ebb05f157bcc2
                                          • Opcode Fuzzy Hash: 229f8876870cdeba67175436a4d9e535b9bafc790f7eccd6728f9f7e61a0eb82
                                          • Instruction Fuzzy Hash: 48618F30F002199FEB649FA5C8547AEBAF6FB88744F20852AE106AB394DB754C41CF95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1744 6e69139-6e6916d 1746 6e6916f-6e69172 1744->1746 1747 6e69a30-6e69a33 1746->1747 1748 6e69178-6e6918d 1746->1748 1749 6e69a35-6e69a54 1747->1749 1750 6e69a59-6e69a5b 1747->1750 1755 6e691a5-6e691bb 1748->1755 1756 6e6918f-6e69195 1748->1756 1749->1750 1752 6e69a62-6e69a65 1750->1752 1753 6e69a5d 1750->1753 1752->1746 1757 6e69a6b-6e69a75 1752->1757 1753->1752 1762 6e691c6-6e691c8 1755->1762 1758 6e69197 1756->1758 1759 6e69199-6e6919b 1756->1759 1758->1755 1759->1755 1763 6e691e0-6e69251 1762->1763 1764 6e691ca-6e691d0 1762->1764 1775 6e69253-6e69276 1763->1775 1776 6e6927d-6e69299 1763->1776 1765 6e691d4-6e691d6 1764->1765 1766 6e691d2 1764->1766 1765->1763 1766->1763 1775->1776 1781 6e692c5-6e692e0 1776->1781 1782 6e6929b-6e692be 1776->1782 1787 6e692e2-6e69304 1781->1787 1788 6e6930b-6e69326 1781->1788 1782->1781 1787->1788 1793 6e6934b-6e69359 1788->1793 1794 6e69328-6e69344 1788->1794 1795 6e6935b-6e69364 1793->1795 1796 6e69369-6e693e3 1793->1796 1794->1793 1795->1757 1802 6e693e5-6e69403 1796->1802 1803 6e69430-6e69445 1796->1803 1807 6e69405-6e69414 1802->1807 1808 6e6941f-6e6942e 1802->1808 1803->1747 1807->1808 1808->1802 1808->1803
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q
                                          • API String ID: 0-127220927
                                          • Opcode ID: 076364ea188baf4669d0bcd76cbe12c6862d00304a62fa339b00770640d287dc
                                          • Instruction ID: 36044c8463e4f95c7f7d6e6808c1502115afd4b67f549057279d2ebcb48cb581
                                          • Opcode Fuzzy Hash: 076364ea188baf4669d0bcd76cbe12c6862d00304a62fa339b00770640d287dc
                                          • Instruction Fuzzy Hash: 1B516131B402069FDB58DB75D850BAEB3FAFB88744F509429D809DB385EE349D06CB92
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 06E4B976
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 6858a2da03cb2c73cc9958b68466d1c27b7aafdcafe99cbb2a87a8c757f5ce22
                                          • Instruction ID: d2900cdb7bb3641e8ea7bc2bd299c400fb3e5d4bc6deb93001886f354382be6f
                                          • Opcode Fuzzy Hash: 6858a2da03cb2c73cc9958b68466d1c27b7aafdcafe99cbb2a87a8c757f5ce22
                                          • Instruction Fuzzy Hash: 3D813570A00B058FD7A4EF3AE44476ABBF5FF88204F008A2DD49AD7A50DB75E845CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c5d083760d707e442a55d99ce246c83c5bc78afa2e49af4389e610e344db5ef6
                                          • Instruction ID: 902850f49fb81c39f3148755e4d37c0620636b57243377109828b2b46245f55a
                                          • Opcode Fuzzy Hash: c5d083760d707e442a55d99ce246c83c5bc78afa2e49af4389e610e344db5ef6
                                          • Instruction Fuzzy Hash: 9D5101B1C04349AFCF11DFA9D884ADDBFB6BF49304F14816AE808AB221D7759885CF91
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06E4DA02
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 573a68c983f1001f286e0009c6a639084e81005a7292d23bbb79f7aa745b7be2
                                          • Instruction ID: 56d4c2ad8835348c51adc71e567bd8e444d31211798f68f9a9585ebdb92a0cb6
                                          • Opcode Fuzzy Hash: 573a68c983f1001f286e0009c6a639084e81005a7292d23bbb79f7aa745b7be2
                                          • Instruction Fuzzy Hash: 3B51E2B1D00349DFDB14DFAAD884ADEBBB5BF48314F24812AE419AB210D775A985CF90
                                          APIs
                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 06E4DA02
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: CreateWindow
                                          • String ID:
                                          • API String ID: 716092398-0
                                          • Opcode ID: 1ad49de933250411d4098f461cb6f1acbdeed2ca6e55e3479ce5dc1f64ef210a
                                          • Instruction ID: e318f824530d2d8b804fcd2339bc0a7a865c1bc73810e11761ae411f162f67f8
                                          • Opcode Fuzzy Hash: 1ad49de933250411d4098f461cb6f1acbdeed2ca6e55e3479ce5dc1f64ef210a
                                          • Instruction Fuzzy Hash: B551C2B1D00309DFDB14DFA9D884ADEBBB5FF48314F24912AE419AB210D775A885CF90
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0313F0BF
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3281818489.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3130000_mpTrle.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: c2594cbc512fff84ecb73a6896dde342204683ae2763ce64e0c062cff4ce97b0
                                          • Instruction ID: 95704ed0180e653276e91693da5bf84d359fdff0c1e20e354b68fb5fcfb87f6a
                                          • Opcode Fuzzy Hash: c2594cbc512fff84ecb73a6896dde342204683ae2763ce64e0c062cff4ce97b0
                                          • Instruction Fuzzy Hash: F22186B1C002499FCB24DFAAC8047EEFFF4EF48310F15855AD848A7251E738A941CBA1
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,06E4329E,?,?,?,?,?), ref: 06E4335F
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: acf5bc4a31bee3d40e7dde4dedfd1cc3136945fca3fa71b4d969b2c37420b4a9
                                          • Instruction ID: dc8ba00305d2b34460b6a8e3d7010036f6aacc2fc68f20e462146e0b06b4e851
                                          • Opcode Fuzzy Hash: acf5bc4a31bee3d40e7dde4dedfd1cc3136945fca3fa71b4d969b2c37420b4a9
                                          • Instruction Fuzzy Hash: 2F21E6B5D00348AFDB10DFAAD584AEEBBF8FB48310F14801AE914A3310D378A944CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,06E4329E,?,?,?,?,?), ref: 06E4335F
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 38b303d69f765fa371d1733c9d49c508539f5f7dd3f6386e0578d4c4d027eb37
                                          • Instruction ID: 714370f30369b01c6bbaccf3bd4f51bba0bd0b0f177a2b5bb9ff9228748c1620
                                          • Opcode Fuzzy Hash: 38b303d69f765fa371d1733c9d49c508539f5f7dd3f6386e0578d4c4d027eb37
                                          • Instruction Fuzzy Hash: 7721E2B5D002089FDB10DFAAD984AEEBBF5FB48310F14805AE919A3350D378A944CFA1
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06E4B9F1,00000800,00000000,00000000), ref: 06E4BBE2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 85c1169229cd98c32facc9a4d7614709b4a9721084cd85443980ca593afe408d
                                          • Instruction ID: 5b343926cb0326bdd2e9db4cfcefd88874f443ab340aa41f79b8b8abcef8b8da
                                          • Opcode Fuzzy Hash: 85c1169229cd98c32facc9a4d7614709b4a9721084cd85443980ca593afe408d
                                          • Instruction Fuzzy Hash: BE1126B6C003499FCB10DFAAD884ADEFBF4FB48310F10841AE519A7204C779A545CFA1
                                          APIs
                                          • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,06E4B9F1,00000800,00000000,00000000), ref: 06E4BBE2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID:
                                          • API String ID: 1029625771-0
                                          • Opcode ID: 7643b954a5bc25568cb1dc5ce091b6c97540c45517d1d7409a382fb0068f6c27
                                          • Instruction ID: d2588823a2b064732595f9ad77650b817756579b499b7d309c0d1bd8f5c49b33
                                          • Opcode Fuzzy Hash: 7643b954a5bc25568cb1dc5ce091b6c97540c45517d1d7409a382fb0068f6c27
                                          • Instruction Fuzzy Hash: 481114B6D003498FDB10DFAAD884AEEFBF4EB48310F10842AE519A7204C379A545CFA1
                                          APIs
                                          • GlobalMemoryStatusEx.KERNELBASE ref: 0313F0BF
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3281818489.0000000003130000.00000040.00000800.00020000.00000000.sdmp, Offset: 03130000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_3130000_mpTrle.jbxd
                                          Similarity
                                          • API ID: GlobalMemoryStatus
                                          • String ID:
                                          • API String ID: 1890195054-0
                                          • Opcode ID: 49a69dc49eefd4b8ba32e9413cb1c4bb44b13ce3f176d5462da6b123eeeb3397
                                          • Instruction ID: 4cc1c1ea69d2e4e71d13cc9cf5181d1d1329a26ba753d2eeeb094cf738a466a0
                                          • Opcode Fuzzy Hash: 49a69dc49eefd4b8ba32e9413cb1c4bb44b13ce3f176d5462da6b123eeeb3397
                                          • Instruction Fuzzy Hash: 661112B1C006599BCB10DF9AC544BEEFBF4EF49320F14816AD818A7240D378A944CFA1
                                          APIs
                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 06E4B976
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303201299.0000000006E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E40000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e40000_mpTrle.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: bebe722bc57fa4c93d0f54eb0c95498c9717aafa96aafd4fba153a5a98874fec
                                          • Instruction ID: 83e3b94544268024a62a8d0325904a096f98f6b0a2d075f7561fbaf78eac6ccb
                                          • Opcode Fuzzy Hash: bebe722bc57fa4c93d0f54eb0c95498c9717aafa96aafd4fba153a5a98874fec
                                          • Instruction Fuzzy Hash: 09110FB6C003498FCB10EFAAD444A9EFBF4AB89214F10841AD569A7210C379A545CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: XPbq
                                          • API String ID: 0-864591470
                                          • Opcode ID: b1d4896c8d5a45a6991c7495299c1602d07e1f2b0d7fcfba37957c84949a833f
                                          • Instruction ID: 4c1a9187814bf91435a5aeef3c89e0ba3467fc09dc77a36fac39a2f31ac5283f
                                          • Opcode Fuzzy Hash: b1d4896c8d5a45a6991c7495299c1602d07e1f2b0d7fcfba37957c84949a833f
                                          • Instruction Fuzzy Hash: 40415E70B002199FEB649FA5C854BAEBAF7FF88740F208529E105AB394DA754C01CB94
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q
                                          • API String ID: 0-3168235125
                                          • Opcode ID: 486372b23f2538a84805a060d6204f72781d32151373be3df28aeb2e52900dd9
                                          • Instruction ID: 712b84c56541af548354a5485272b7a30958a5ae119fe063f226cc3d8ec99441
                                          • Opcode Fuzzy Hash: 486372b23f2538a84805a060d6204f72781d32151373be3df28aeb2e52900dd9
                                          • Instruction Fuzzy Hash: EF41A130F4030A9FDB64DF65C9506AEBBB6FF85344F205929E405D7248DB74D946CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q
                                          • API String ID: 0-3168235125
                                          • Opcode ID: f46e3e24e989760697ca107bfede52c7fcf9012b805053aad6af40dd884f66e0
                                          • Instruction ID: 578f4a6c0d558153baf0e358e796a8044b8221b3cc54d762a9f1d25c72685835
                                          • Opcode Fuzzy Hash: f46e3e24e989760697ca107bfede52c7fcf9012b805053aad6af40dd884f66e0
                                          • Instruction Fuzzy Hash: FF312230B403028FDB999B75D81466E3BA7AF89684F10A538E006DB390DF35CE06CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH]q
                                          • API String ID: 0-3168235125
                                          • Opcode ID: bac6d49f233e1392471e494cb8e91267eb56e2ec7fcd1aabed065559cf09dc47
                                          • Instruction ID: bccf1dbdd6e333f97d384271decc77dbfc2108701ca68fc87d457cbb60657ab9
                                          • Opcode Fuzzy Hash: bac6d49f233e1392471e494cb8e91267eb56e2ec7fcd1aabed065559cf09dc47
                                          • Instruction Fuzzy Hash: 9A310F30B403028FDB589B75D91466E7AA7AF89684F10953CE006DB394DF34DE06C7A5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q
                                          • API String ID: 0-1007455737
                                          • Opcode ID: ae091678f41f2c1d100a237406dd39735618dd5404521e03d4e00bad44449b02
                                          • Instruction ID: 682b6a8d337bd842371c31abe3bba30f5b7b1d19f58b8d19cfa83e02ad104d30
                                          • Opcode Fuzzy Hash: ae091678f41f2c1d100a237406dd39735618dd5404521e03d4e00bad44449b02
                                          • Instruction Fuzzy Hash: 17F0AF35BC0301CFDF788A86EA986BEB3A9EB54398F147069E905CB241D636DD06C771
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 026b304eacb16739946b9e6b5b11d4073954ef5a4851f521af3e3b19dfb8efe5
                                          • Instruction ID: 68d40f284336653c6c0c4fd2b37857b6ee79372af41d56a5857e543ead492f87
                                          • Opcode Fuzzy Hash: 026b304eacb16739946b9e6b5b11d4073954ef5a4851f521af3e3b19dfb8efe5
                                          • Instruction Fuzzy Hash: EB61D171F501114FDB649A6EC88066FBADBAFD4214F154479E80EDB320DEB9DD0287D2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 377a62e7fb742e3a8471624efdd53af1d205843fa2f82ea69b05d273c6fc3334
                                          • Instruction ID: be6f4665555b30a3a0b06124453883e92fad1d611f2e00276d712455548f6df8
                                          • Opcode Fuzzy Hash: 377a62e7fb742e3a8471624efdd53af1d205843fa2f82ea69b05d273c6fc3334
                                          • Instruction Fuzzy Hash: 4E815F30B4060A8FDB54DFA5D4547AEB7F6EF88344F109529E40ADB394DB34DC468B52
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fcc07e02897446f724d0c946a5c6756df93e6fd8cb5106f4daa71affed23020a
                                          • Instruction ID: 3d7348dee662d90dcc4712c3f7a2eca7fef93144a25e1900fed9f872911d80f3
                                          • Opcode Fuzzy Hash: fcc07e02897446f724d0c946a5c6756df93e6fd8cb5106f4daa71affed23020a
                                          • Instruction Fuzzy Hash: AD912D30E103198FDF60DF69C890B9DB7B1FF89304F20C599E549AB295DB70AA85CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dbe10348840f5c70a7814a94b4774620f1b2f085fd3881150be48d1c32c7dd2b
                                          • Instruction ID: 8ebd55c8f28da9b02773670a645647abbc8aee5eb44168c30ed0c56969b11f7c
                                          • Opcode Fuzzy Hash: dbe10348840f5c70a7814a94b4774620f1b2f085fd3881150be48d1c32c7dd2b
                                          • Instruction Fuzzy Hash: 70912D30E10219CBDF64DF69C890B9DB7B1FF89304F20C599E509AB295DB70AA85CF91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a0a5777d804320ee3f058b86a27c4e55f2bd7d8c61fb37f5d443cbe40187075b
                                          • Instruction ID: 023cab563099e1932d67a9834caee296d4288f60a0ff90ec7b3c4ae18f84fd88
                                          • Opcode Fuzzy Hash: a0a5777d804320ee3f058b86a27c4e55f2bd7d8c61fb37f5d443cbe40187075b
                                          • Instruction Fuzzy Hash: EA715E70A002098FDB54DFA9D990AADBBF6FF88344F249429E009EB355DB30EC46CB50
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 74024863ea0bfbe2981373ca9525ce940cf8b4ea57245277a5715dc660ca3fba
                                          • Instruction ID: 83e18c436217f165c22de884999ae143dd7d0bc0b69987b5f445310ac4d5b540
                                          • Opcode Fuzzy Hash: 74024863ea0bfbe2981373ca9525ce940cf8b4ea57245277a5715dc660ca3fba
                                          • Instruction Fuzzy Hash: FA713C74A002099FDB54DFA9D990A9EBBF6FF88344F249429E009EB355DB30EC46CB50
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6db948790a640bcb3de07650b48edb8b28fa22cfcbedfeeebd8c8c2d8fe7668d
                                          • Instruction ID: 849c1799f3f20805e1c9bde035f825f947581d5dba32dd2687d8bd46b1b6bb7b
                                          • Opcode Fuzzy Hash: 6db948790a640bcb3de07650b48edb8b28fa22cfcbedfeeebd8c8c2d8fe7668d
                                          • Instruction Fuzzy Hash: B951D231E00205DFDB24AB79F8546ADBBB3EF84359F10887AE106D7250DB359805CB81
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: de9146251bdc90179e81c505020cae37c698e526c69e250ce9037c7e1ad36e4d
                                          • Instruction ID: de3b1bf54ac084bcd1788ac5fab3cd3cda8045f5f953f029f794dc0619b3feb1
                                          • Opcode Fuzzy Hash: de9146251bdc90179e81c505020cae37c698e526c69e250ce9037c7e1ad36e4d
                                          • Instruction Fuzzy Hash: 4451D270B503049FEF60566AF95477E3A9FEB89354F20182AE40AC7396CA2DCC4583A2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e3d580fd676581382be7c0b7c335d5845965cbb1c931fdc0819ea19af4e517cd
                                          • Instruction ID: 7e7c644634c7dbec0dded7e7caf46d973df0904c0f3f95451524eabccd8fcf32
                                          • Opcode Fuzzy Hash: e3d580fd676581382be7c0b7c335d5845965cbb1c931fdc0819ea19af4e517cd
                                          • Instruction Fuzzy Hash: 5451D370B503048FEF70566EF95477E369FDB89394F20582AE40AC7395CA2DCC458392
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0c49f327540cfdb7d07a5fc8588f4057872b80b091566c99c9732a9b880851e3
                                          • Instruction ID: 7131f9904950ae17d57c9747766cd066e8861467129e41a7a7e5508915b8fc24
                                          • Opcode Fuzzy Hash: 0c49f327540cfdb7d07a5fc8588f4057872b80b091566c99c9732a9b880851e3
                                          • Instruction Fuzzy Hash: 36417B71E407098FCB60CFAAD880AAEBBF2EB85314F10592AE15AD7650D731E8558B91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ae98a63bdda7cab8038396bf67e4f037ec4634f4166ad95d698d8099ce81d651
                                          • Instruction ID: 4359ad8c94b5e8d75681194a0ca8a462108c7b6644af11dd6973be47aeae10cd
                                          • Opcode Fuzzy Hash: ae98a63bdda7cab8038396bf67e4f037ec4634f4166ad95d698d8099ce81d651
                                          • Instruction Fuzzy Hash: 1C31C670F503068BDF708E6AC88077EBBB1FB45368F20992AE459D7281C635D951CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 232335fc491eb0412849fa686edb6cfb839a7551f33e6afcf712e9c9008add78
                                          • Instruction ID: 36228e8d6ad98291844e20fdf8d16c12109897979b911a4517488f59345a342f
                                          • Opcode Fuzzy Hash: 232335fc491eb0412849fa686edb6cfb839a7551f33e6afcf712e9c9008add78
                                          • Instruction Fuzzy Hash: 7331C330B1430A8FCB64DF66D890A9EBBB6FF85308F105929E405AB300D770E806CB91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 04a4a8db1a8e84922c445bccf8a98916f9c0fb9a6b936cca182cb64c8a1cabfd
                                          • Instruction ID: 8648d252fab8cd09dc6616fb12b2031aad3b50c7e61d562b7423ecffead9d66f
                                          • Opcode Fuzzy Hash: 04a4a8db1a8e84922c445bccf8a98916f9c0fb9a6b936cca182cb64c8a1cabfd
                                          • Instruction Fuzzy Hash: F131C130E102099FCB68CFA5C85469EB7B2FF89304F10D529E91AE7340DB31AD46CB90
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 43824673efab160c09139e69217accdf80c9f0b9d33b70c690dcc67406993f3f
                                          • Instruction ID: 79f09bb7ce5f4c0774758e23327215a0d5ffa3a0b6a0ce567d868939d8351cbb
                                          • Opcode Fuzzy Hash: 43824673efab160c09139e69217accdf80c9f0b9d33b70c690dcc67406993f3f
                                          • Instruction Fuzzy Hash: C2318030E142099FCB58CFA5C85469EB7B2FF89304F10D519E91AE7350DB75AD46CB90
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4305a947f817792419f99ff59c0bb93a00c5fc192aac207d488621fd7c8da830
                                          • Instruction ID: 84c8dfa1f06e0fa1c8e4c8ff8f3300462f18089abd806ea5ca0f55d8a2d53d78
                                          • Opcode Fuzzy Hash: 4305a947f817792419f99ff59c0bb93a00c5fc192aac207d488621fd7c8da830
                                          • Instruction Fuzzy Hash: CA319831F407059FCB50CF69D841AEEBBBAEB48320F149129F904E7290E735DC028BA1
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8959a9bdc7cbe5b6e1d8371a8d2976d3b5105165db6454385142b2438d46886
                                          • Instruction ID: dcc0ee177858033368695bb2dc78ccc4d89f2792d6a410eab90cd495c9b913b3
                                          • Opcode Fuzzy Hash: d8959a9bdc7cbe5b6e1d8371a8d2976d3b5105165db6454385142b2438d46886
                                          • Instruction Fuzzy Hash: B2217775F403059FDB50DF6AD880AEEBBF6EB48314F20A029E909E7290E735DC018B91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3279209462.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_165d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 92b6d5837bcfe3120a5e24d565096d513a0aabe32f9b6f2f1556bc54e1af62c5
                                          • Instruction ID: 19abe8f7e05a7bcc8214807701d334ddfc275ec23c7611e9a0b90589190c6ac8
                                          • Opcode Fuzzy Hash: 92b6d5837bcfe3120a5e24d565096d513a0aabe32f9b6f2f1556bc54e1af62c5
                                          • Instruction Fuzzy Hash: 9A210071504204AFCB55DFA8C980B26BB65FB84314F20C569ED490B392C73AD447CA62
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8863900ec00607a75223af2f4b382021e16ceb782124486594ed117d8de441a3
                                          • Instruction ID: 0fbcdcec6df0c8f0b18aab88bc189a360f8341f981168123756c09ac2dce46a6
                                          • Opcode Fuzzy Hash: 8863900ec00607a75223af2f4b382021e16ceb782124486594ed117d8de441a3
                                          • Instruction Fuzzy Hash: 3821A570E002299FCB68DB69D8405EDF7F6EF89354F10A969E44AE7340DA319A41CBA0
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c93a9e762f44dc0465e5d51f54bd13aafbb5ed567340211c31d4272bb4a2ce23
                                          • Instruction ID: 9dd40b9b3bd1a96f299c822cce106131dde974ee6e771452af5768f6cd8074ec
                                          • Opcode Fuzzy Hash: c93a9e762f44dc0465e5d51f54bd13aafbb5ed567340211c31d4272bb4a2ce23
                                          • Instruction Fuzzy Hash: 7B21D530B102199FDF94EB6AE9507AEB7B6EB84358F20A038E405D7340D735DC458B91
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 916b723921be6204595b5b87eb3e837efa341dfe538516984c0ab408220e8aa8
                                          • Instruction ID: fea717288a646e5a818f9170983c12a50d7e2bca46d5b87d3eb3dc2bab152382
                                          • Opcode Fuzzy Hash: 916b723921be6204595b5b87eb3e837efa341dfe538516984c0ab408220e8aa8
                                          • Instruction Fuzzy Hash: FF114831F803111FCB61A63EEC1476EB7D9EB867A4F104439F109D7240DA25DD06C3A1
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5357c9c83123f04373d89010f10a2228199471792c1e81ceedd72135242b2a93
                                          • Instruction ID: 1674ea0b59f8097d76882e16b7998c3502cbaed9329a09bc7169dd9dec3425ab
                                          • Opcode Fuzzy Hash: 5357c9c83123f04373d89010f10a2228199471792c1e81ceedd72135242b2a93
                                          • Instruction Fuzzy Hash: 6E01D231B002148FDB659AAED850B6ABBDBDBC5758F20843AE449C7395DA21CC068391
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a8ff1819b0d749a173e7cfd71c9c4c8c20529e3c5ee7a99b43a4ed7290a54eac
                                          • Instruction ID: 0a5a9246992772cc876eb509fe21f5de4d7e67acfd918747b9e74b6972e4344e
                                          • Opcode Fuzzy Hash: a8ff1819b0d749a173e7cfd71c9c4c8c20529e3c5ee7a99b43a4ed7290a54eac
                                          • Instruction Fuzzy Hash: AE11A531B102298FDB98D679DC146AF73EAEBC8754F008539D50AE7380EE25DC028BD2
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f3311b7e38db1ce9488018721285f69b46ff5a83ba982411212438df8d09c745
                                          • Instruction ID: d3d82d766bf59cfac5543f4aac61123ed8d3dac0a0a15c9079cf8718b09e8998
                                          • Opcode Fuzzy Hash: f3311b7e38db1ce9488018721285f69b46ff5a83ba982411212438df8d09c745
                                          • Instruction Fuzzy Hash: 4301F176B002100FCB728B2AE85476A7BDBDBC6654F10483AF50AC7341DA24CD0687A1
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6a728c1793e56ff6e280235fae2c8a0749ecd9e6a03515fdab7f90acde51007b
                                          • Instruction ID: 01bfbb083b7da349d515ce8b9d3b0370d03cdca726d293416c0f3a38830e93f2
                                          • Opcode Fuzzy Hash: 6a728c1793e56ff6e280235fae2c8a0749ecd9e6a03515fdab7f90acde51007b
                                          • Instruction Fuzzy Hash: 2A01B532B502258BDBA99A69DC146EB77EAEFC8754F004539D44AE7380EF258C034792
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d23e722832d9a5c1b9d44ca9d2ac776a8e9e223e0252d1be2a3b8d8098a98aa5
                                          • Instruction ID: c8ac45d1c7d3f6ebb2ba520029cf6264a2beac511e83e4fd9d882258b6570ad4
                                          • Opcode Fuzzy Hash: d23e722832d9a5c1b9d44ca9d2ac776a8e9e223e0252d1be2a3b8d8098a98aa5
                                          • Instruction Fuzzy Hash: 7421CEB5D01259AFCB10DF9AD984ADEFFB4FF59310F10922AE518A7200C378A954CFA5
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3279209462.000000000165D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0165D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_165d000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction ID: 8556d7bceff6d7aac9f8dae5cd83b374f8e3969a5ad1fd5380c86a419194e2cb
                                          • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                                          • Instruction Fuzzy Hash: AE11A9755042848FDB12CF54C9C4B15BBA2FB84214F24C6A9DC494B392C33AD44ACB62
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bfca097b0358ea032ecc842750f0d0b6d8b8c1153e583003660c8f5f209cb01e
                                          • Instruction ID: 95fdba09943a0f815158f3c7ccb14044d7954f9271fec8f0cffe564fa95008d3
                                          • Opcode Fuzzy Hash: bfca097b0358ea032ecc842750f0d0b6d8b8c1153e583003660c8f5f209cb01e
                                          • Instruction Fuzzy Hash: EB11D3B5D01259AFCB00DF9AD884ADEFFB4FF49310F10812AE518A7200C374A944CFA5
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 15cff760842ef477e6fafc2433369688614c4aa089921d3390f10732c1d1e374
                                          • Instruction ID: 7921deef5238ba4e6f8ce80f5641deb6583050fadff5e4db108ebc683f95cffb
                                          • Opcode Fuzzy Hash: 15cff760842ef477e6fafc2433369688614c4aa089921d3390f10732c1d1e374
                                          • Instruction Fuzzy Hash: 6801AD31B005148FDBA496AED454B2BA2DAEBC9718F20C43AE50EC7394DE65DC0643A5
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 105d8d3724fe4a4d5569370018cfe6844304e7a4b870c3c95e67cac1216d0715
                                          • Instruction ID: ce4e416c21d6b2644e2baf9baca23b60dd442e5d0dad01c0cf8bce7f32dfd993
                                          • Opcode Fuzzy Hash: 105d8d3724fe4a4d5569370018cfe6844304e7a4b870c3c95e67cac1216d0715
                                          • Instruction Fuzzy Hash: 0A01DC72B002140FCB759A6EE854B2EB3CBEBC9798F108839F50AC7340DE29DD068795
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fc49162098de0f3d1542b28f0e282de84b5367c348dd7f13680685e72dbfbea9
                                          • Instruction ID: df71bdb31c3c16883b5ecb6fd5fa575ec9fa8dd4ad6feaa84269ef07233c340d
                                          • Opcode Fuzzy Hash: fc49162098de0f3d1542b28f0e282de84b5367c348dd7f13680685e72dbfbea9
                                          • Instruction Fuzzy Hash: 0501D131F402154FCB64AA2ED858B2EB3DAEB89798F108838E10AD7340DA25DC028395
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3255801bc13530ef879442de4044e3358d62b505cb3c6a5308cbf83d64b38710
                                          • Instruction ID: 65a367ae62ead56531bd4a9aa408e9f8d488a98a1d899784f946d2ea244c31bb
                                          • Opcode Fuzzy Hash: 3255801bc13530ef879442de4044e3358d62b505cb3c6a5308cbf83d64b38710
                                          • Instruction Fuzzy Hash: E201A931F103249BCF649A6AE940A9D7779FB49758F10553DE505E7340DB36AC04C7D4
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26e910eca150be3cdd0fcc8a37d9c6f41f360fe9c7b7e0edee0c1acb4d98da00
                                          • Instruction ID: 9c7816090b7aa9d5ab245769ad5e31604c6d064f592fddc43708c1f1f64360be
                                          • Opcode Fuzzy Hash: 26e910eca150be3cdd0fcc8a37d9c6f41f360fe9c7b7e0edee0c1acb4d98da00
                                          • Instruction Fuzzy Hash: 88E09B30E553546FDB60DAB1895575B3F68E701294F204995E408C7101E1B6CD0287D1
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9652ccd2324cc4f5f3ba64f4eb56a4462d46cfb5984fb21e8dfdacbeb8aaba2
                                          • Instruction ID: efa20084f598df66cf55cb22dc2fb65893d67a2c71cbd0d56a53d55781711b12
                                          • Opcode Fuzzy Hash: b9652ccd2324cc4f5f3ba64f4eb56a4462d46cfb5984fb21e8dfdacbeb8aaba2
                                          • Instruction Fuzzy Hash: E2E0676500E3C08FC767973498686907FB16F03209B5A15DBC491CF1E7D729991AD722
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-2843079600
                                          • Opcode ID: 42eeffb0d1f95fe62d69329f8662e27fa9233724f64d313e16a46671aaf1d590
                                          • Instruction ID: 95e3b8c95df260bf16d799fd8d7840ed6210a08262ab857fcf93023c2672bbad
                                          • Opcode Fuzzy Hash: 42eeffb0d1f95fe62d69329f8662e27fa9233724f64d313e16a46671aaf1d590
                                          • Instruction Fuzzy Hash: 5A124B30A403198FDB68DF69C890A9DB7F6FF89748F209969D40AAB354DB349D45CF80
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-1273862796
                                          • Opcode ID: 058b2b3dc823650c9c0726252d740d71591f54ddc34409ea842884ddfb80cb77
                                          • Instruction ID: 647a0da16c97786c8eeb1781bd2b633c3566cef994c249fafbfccee57123f76e
                                          • Opcode Fuzzy Hash: 058b2b3dc823650c9c0726252d740d71591f54ddc34409ea842884ddfb80cb77
                                          • Instruction Fuzzy Hash: 11917130E403099FDB68DF6ADA94BAE77F6EF48344F209539E402AB254DB349C45CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                          • API String ID: 0-981061697
                                          • Opcode ID: 0c50ce3bfd70503272c97bc624b4ad16e25eddc6a06c1a301da2a23532ddb4cd
                                          • Instruction ID: 7c759b2d1c137fbf4dd959adde23ff073a29cf09ae0e0d3c7c0c2a53502effa9
                                          • Opcode Fuzzy Hash: 0c50ce3bfd70503272c97bc624b4ad16e25eddc6a06c1a301da2a23532ddb4cd
                                          • Instruction Fuzzy Hash: 1BF14C34A40308CFDB58EF69D594A6EB7B6FF88344F249568E8069B354DB35DC42CB81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: 1b4328878b1dea5e580d40a4212f94c4591e26fc89b4e47a470834aed58fb748
                                          • Instruction ID: 008616a20fbc854c4bb403b0bd98311f271e578897510c8d7607ec9372d8f204
                                          • Opcode Fuzzy Hash: 1b4328878b1dea5e580d40a4212f94c4591e26fc89b4e47a470834aed58fb748
                                          • Instruction Fuzzy Hash: 03B15D34A503098FDB68EF65C59066EB7B6FF88344F249829E406DB394DB74DC82CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LR]q$LR]q$$]q$$]q
                                          • API String ID: 0-3527005858
                                          • Opcode ID: c053e8d8953a1edebbcdf402d4df13ae2b60275300526bab9d62fa40706de187
                                          • Instruction ID: de109837104d230754c9415adc770956a7b65b337b6f3e48f4a712a5dda1729f
                                          • Opcode Fuzzy Hash: c053e8d8953a1edebbcdf402d4df13ae2b60275300526bab9d62fa40706de187
                                          • Instruction Fuzzy Hash: 3051B130B403018FDB68DB29D950A6BB7EAFF88344F10A56CE4069B365DA34EC41C7A5
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000C.00000002.3303647061.0000000006E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E60000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_12_2_6e60000_mpTrle.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $]q$$]q$$]q$$]q
                                          • API String ID: 0-858218434
                                          • Opcode ID: d30f1f536dff3af0cebf8dcb1873bc2941f7ca27889fc3155cfa51468197728b
                                          • Instruction ID: fc07070eed68ba0a5a1117d522fb693f8cebaf3880f1634ca3b31ce811f5643b
                                          • Opcode Fuzzy Hash: d30f1f536dff3af0cebf8dcb1873bc2941f7ca27889fc3155cfa51468197728b
                                          • Instruction Fuzzy Hash: C7518F30E503048FDF68DE69D580AAEB7B6FF89358F10A539E806A7244DB35DC82CB50