Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Bill Of Lading.exe

Overview

General Information

Sample name:Bill Of Lading.exe
Analysis ID:1544350
MD5:e6d942c53b473fb6f9b53a24a59d083b
SHA1:284b60dfc554bfb5aa78717d510a4b1a702b4598
SHA256:862a367b1e130dc47d08a2d4ce26bec8d85196f00c1a3f6c0df4fc5f099139cd
Tags:exeMassLoggeruser-Maciej8910871
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Bill Of Lading.exe (PID: 7096 cmdline: "C:\Users\user\Desktop\Bill Of Lading.exe" MD5: E6D942C53B473FB6F9B53A24A59D083B)
    • powershell.exe (PID: 2108 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • Bill Of Lading.exe (PID: 2516 cmdline: "C:\Users\user\Desktop\Bill Of Lading.exe" MD5: E6D942C53B473FB6F9B53A24A59D083B)
  • cleanup
{"EXfil Mode": "SMTP", "From": "kingnovasend@zqamcx.com", "Password": "Anambraeast", "Server": "zqamcx.com", "To": "kingnovaresult@zqamcx.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xefa7:$a1: get_encryptedPassword
        • 0xf2cf:$a2: get_encryptedUsername
        • 0xed42:$a3: get_timePasswordChanged
        • 0xee63:$a4: get_passwordField
        • 0xefbd:$a5: set_encryptedPassword
        • 0x10919:$a7: get_logins
        • 0x105ca:$a8: GetOutlookPasswords
        • 0x103bc:$a9: StartKeylogger
        • 0x10869:$a10: KeyLoggerEventArgs
        • 0x10419:$a11: KeyLoggerEventArgsEventHandler
        00000004.00000002.2930568379.0000000003413000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          0.2.Bill Of Lading.exe.422f9b8.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.Bill Of Lading.exe.422f9b8.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.Bill Of Lading.exe.422f9b8.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.Bill Of Lading.exe.422f9b8.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xd3a7:$a1: get_encryptedPassword
                • 0xd6cf:$a2: get_encryptedUsername
                • 0xd142:$a3: get_timePasswordChanged
                • 0xd263:$a4: get_passwordField
                • 0xd3bd:$a5: set_encryptedPassword
                • 0xed19:$a7: get_logins
                • 0xe9ca:$a8: GetOutlookPasswords
                • 0xe7bc:$a9: StartKeylogger
                • 0xec69:$a10: KeyLoggerEventArgs
                • 0xe819:$a11: KeyLoggerEventArgsEventHandler
                0.2.Bill Of Lading.exe.422f9b8.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x1234b:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x11849:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x11b57:$a4: \Orbitum\User Data\Default\Login Data
                • 0x1294f:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 18 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bill Of Lading.exe", ParentImage: C:\Users\user\Desktop\Bill Of Lading.exe, ParentProcessId: 7096, ParentProcessName: Bill Of Lading.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe", ProcessId: 2108, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bill Of Lading.exe", ParentImage: C:\Users\user\Desktop\Bill Of Lading.exe, ParentProcessId: 7096, ParentProcessName: Bill Of Lading.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe", ProcessId: 2108, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Bill Of Lading.exe", ParentImage: C:\Users\user\Desktop\Bill Of Lading.exe, ParentProcessId: 7096, ParentProcessName: Bill Of Lading.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe", ProcessId: 2108, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-29T10:11:05.807600+010028032742Potentially Bad Traffic192.168.2.449735132.226.247.7380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 4.2.Bill Of Lading.exe.400000.0.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "kingnovasend@zqamcx.com", "Password": "Anambraeast", "Server": "zqamcx.com", "To": "kingnovaresult@zqamcx.com", "Port": 587}
                Source: Bill Of Lading.exeReversingLabs: Detection: 39%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Bill Of Lading.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Bill Of Lading.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49737 version: TLS 1.0
                Source: Bill Of Lading.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 016B5782h4_2_016B5367
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 016B51B9h4_2_016B4F08
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 016B5782h4_2_016B56AF
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DF028h4_2_032DED80
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D1935h4_2_032D15F8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DADC8h4_2_032DAB20
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D3648h4_2_032D33A0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DB678h4_2_032DB3D0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DD4E0h4_2_032DD238
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DA518h4_2_032DA270
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DFD30h4_2_032DFA88
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D2D98h4_2_032D2AF0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DEBD0h4_2_032DE928
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D1449h4_2_032D11A0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DCC30h4_2_032DC988
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DF480h4_2_032DF1D8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DBAD0h4_2_032DB828
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DE320h4_2_032DE078
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D02E9h4_2_032D0040
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D4350h4_2_032D40A8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D0B99h4_2_032D08F0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DC380h4_2_032DC0D8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DB220h4_2_032DAF78
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D31F0h4_2_032D2F48
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D3AA0h4_2_032D37F8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DF8D8h4_2_032DF630
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DA0C0h4_2_032D9E18
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DD93Ah4_2_032DD690
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DA970h4_2_032DA6C8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DC7D8h4_2_032DC530
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D0FF1h4_2_032D0D48
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DD088h4_2_032DCDE0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DDEC8h4_2_032DDC20
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D3EF8h4_2_032D3C50
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DBF28h4_2_032DBC80
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032D0741h4_2_032D0498
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4x nop then jmp 032DE778h4_2_032DE4D0
                Source: global trafficHTTP traffic detected: GET /xml/173.254.250.72 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49735 -> 132.226.247.73:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49737 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/173.254.250.72 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2930568379.0000000003362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: Bill Of Lading.exe, 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: Bill Of Lading.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: Bill Of Lading.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                Source: Bill Of Lading.exe, 00000004.00000002.2932716235.0000000006968000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                Source: Bill Of Lading.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000338B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000338B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: Bill Of Lading.exe, 00000000.00000002.1730779079.0000000002959000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2930568379.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: Bill Of Lading.exe, 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: Bill Of Lading.exe, 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/173.254.250.72d
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/173.254.250.72l
                Source: Bill Of Lading.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                Source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 0.2.Bill Of Lading.exe.422f9b8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bill Of Lading.exe.422f9b8.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Bill Of Lading.exe.4218b98.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bill Of Lading.exe.4218b98.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.Bill Of Lading.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.Bill Of Lading.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Bill Of Lading.exe PID: 7096, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Bill Of Lading.exe PID: 2516, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: initial sampleStatic PE information: Filename: Bill Of Lading.exe
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07373B8C NtQueryInformationProcess,0_2_07373B8C
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07378BB8 NtQueryInformationProcess,0_2_07378BB8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_00E1D3C40_2_00E1D3C4
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_072AE1000_2_072AE100
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_072AE7D80_2_072AE7D8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_0737E4300_2_0737E430
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07375F000_2_07375F00
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07374C300_2_07374C30
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_0737A7780_2_0737A778
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_0737A7880_2_0737A788
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_0737E41F0_2_0737E41F
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_073784D80_2_073784D8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_073780180_2_07378018
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07375EF20_2_07375EF2
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07378D880_2_07378D88
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07374C210_2_07374C21
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07377BD00_2_07377BD0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_0737AA100_2_0737AA10
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_0737A9FF0_2_0737A9FF
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07AB73E80_2_07AB73E8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07AB31B10_2_07AB31B1
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07AB31C00_2_07AB31C0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07AB11380_2_07AB1138
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07AB0D000_2_07AB0D00
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07AB15700_2_07AB1570
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_07AB28100_2_07AB2810
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016BC1684_2_016BC168
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016B19B84_2_016B19B8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016BCAB04_2_016BCAB0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016B2DD14_2_016B2DD1
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016B4F084_2_016B4F08
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016B7E684_2_016B7E68
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016BB9E04_2_016BB9E0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016BB9D04_2_016BB9D0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016BCA824_2_016BCA82
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016B7E674_2_016B7E67
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016B4EF84_2_016B4EF8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D69984_2_032D6998
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D77704_2_032D7770
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D45004_2_032D4500
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DED804_2_032DED80
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D15F84_2_032D15F8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D1C584_2_032D1C58
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DAB204_2_032DAB20
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DAB104_2_032DAB10
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D1B4A4_2_032D1B4A
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D33A04_2_032D33A0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D33934_2_032D3393
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DB3C14_2_032DB3C1
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DB3D04_2_032DB3D0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DD2384_2_032DD238
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DA2614_2_032DA261
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DFA784_2_032DFA78
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DA2704_2_032DA270
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DFA884_2_032DFA88
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D2AE04_2_032D2AE0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D2AF04_2_032D2AF0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DE9284_2_032DE928
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DE91F4_2_032DE91F
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DC97B4_2_032DC97B
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D11A04_2_032D11A0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D118F4_2_032D118F
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DC9884_2_032DC988
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DF1C84_2_032DF1C8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DF1D84_2_032DF1D8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DB8284_2_032DB828
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D00064_2_032D0006
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DB8184_2_032DB818
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DE0684_2_032DE068
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DE0784_2_032DE078
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D00404_2_032D0040
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D40A84_2_032D40A8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D40984_2_032D4098
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D08F04_2_032D08F0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DC0CB4_2_032DC0CB
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D08DF4_2_032D08DF
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DC0D84_2_032DC0D8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D2F384_2_032D2F38
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DAF684_2_032DAF68
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DAF784_2_032DAF78
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D2F484_2_032D2F48
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D37E84_2_032D37E8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D37F84_2_032D37F8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DF6204_2_032DF620
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DF6304_2_032DF630
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D9E184_2_032D9E18
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DA6B94_2_032DA6B9
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DD6834_2_032DD683
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DD6904_2_032DD690
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DA6C84_2_032DA6C8
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DC5204_2_032DC520
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D0D3C4_2_032D0D3C
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DC5304_2_032DC530
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DED704_2_032DED70
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D0D484_2_032D0D48
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D15EB4_2_032D15EB
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DCDE04_2_032DCDE0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DCDD04_2_032DCDD0
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DDC204_2_032DDC20
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DDC134_2_032DDC13
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DBC714_2_032DBC71
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D3C434_2_032D3C43
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D3C504_2_032D3C50
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D048C4_2_032D048C
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DBC804_2_032DBC80
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D04984_2_032D0498
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032D9C904_2_032D9C90
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DE4C34_2_032DE4C3
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_032DE4D04_2_032DE4D0
                Source: Bill Of Lading.exeStatic PE information: invalid certificate
                Source: Bill Of Lading.exe, 00000000.00000002.1730779079.0000000002959000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Bill Of Lading.exe
                Source: Bill Of Lading.exe, 00000000.00000002.1734533089.000000000B570000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Bill Of Lading.exe
                Source: Bill Of Lading.exe, 00000000.00000000.1676963877.0000000000562000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamejGmN.exe4 vs Bill Of Lading.exe
                Source: Bill Of Lading.exe, 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Bill Of Lading.exe
                Source: Bill Of Lading.exe, 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs Bill Of Lading.exe
                Source: Bill Of Lading.exe, 00000000.00000002.1733884571.00000000075F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShe vs Bill Of Lading.exe
                Source: Bill Of Lading.exe, 00000000.00000002.1729141781.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Bill Of Lading.exe
                Source: Bill Of Lading.exe, 00000004.00000002.2928664508.00000000012F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Bill Of Lading.exe
                Source: Bill Of Lading.exe, 00000004.00000002.2928507944.000000000041A000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Bill Of Lading.exe
                Source: Bill Of Lading.exeBinary or memory string: OriginalFilenamejGmN.exe4 vs Bill Of Lading.exe
                Source: Bill Of Lading.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.Bill Of Lading.exe.422f9b8.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bill Of Lading.exe.422f9b8.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Bill Of Lading.exe.4218b98.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bill Of Lading.exe.4218b98.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.Bill Of Lading.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.Bill Of Lading.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Bill Of Lading.exe PID: 7096, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Bill Of Lading.exe PID: 2516, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Bill Of Lading.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, VNK5t567Ta80gukmJr.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, VNK5t567Ta80gukmJr.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, VNK5t567Ta80gukmJr.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, VNK5t567Ta80gukmJr.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, VNK5t567Ta80gukmJr.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, VNK5t567Ta80gukmJr.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, yYex5M0Fb9d9vCYsJy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, yYex5M0Fb9d9vCYsJy.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/6@2/2
                Source: C:\Users\user\Desktop\Bill Of Lading.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Bill Of Lading.exe.logJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMutant created: NULL
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMutant created: \Sessions\1\BaseNamedObjects\sLOqATlyg
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1508:120:WilError_03
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lefng4a4.n3e.ps1Jump to behavior
                Source: Bill Of Lading.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Bill Of Lading.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\Bill Of Lading.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Bill Of Lading.exe, 00000004.00000002.2930568379.00000000033EC000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2930568379.00000000033DE000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2930568379.00000000033CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Bill Of Lading.exeReversingLabs: Detection: 39%
                Source: unknownProcess created: C:\Users\user\Desktop\Bill Of Lading.exe "C:\Users\user\Desktop\Bill Of Lading.exe"
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess created: C:\Users\user\Desktop\Bill Of Lading.exe "C:\Users\user\Desktop\Bill Of Lading.exe"
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess created: C:\Users\user\Desktop\Bill Of Lading.exe "C:\Users\user\Desktop\Bill Of Lading.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\Bill Of Lading.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Bill Of Lading.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Bill Of Lading.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 0.2.Bill Of Lading.exe.53a0000.3.raw.unpack, Uo.cs.Net Code: _202A_202E_206E_206A_202B_206A_200E_200D_206F_200D_200C_200B_206E_202C_202B_200E_206A_202D_202A_202C_202E_206B_202C_202E_202D_206F_206C_200E_202D_206B_202D_206D_202A_200C_200C_200B_200C_202B_200D_202E_202E System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, VNK5t567Ta80gukmJr.cs.Net Code: t9XjiCC8h5 System.Reflection.Assembly.Load(byte[])
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, VNK5t567Ta80gukmJr.cs.Net Code: t9XjiCC8h5 System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_072AA656 push FFFFFF8Bh; iretd 0_2_072AA65A
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 0_2_072A5430 push eax; ret 0_2_072A5471
                Source: Bill Of Lading.exeStatic PE information: section name: .text entropy: 7.597028428709984
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, WsdF1GHByCfG39n34hG.csHigh entropy of concatenated method names: 'XTs7ejQMdT', 'FEl7mXO3NH', 'Mro7is3dOB', 'AbT7qGhn8E', 'TrX7niYG7s', 'jyk75k8438', 'vKn7fCvmJL', 'OJP709tXqf', 'ney7aAyiZP', 'gx87vECJ1L'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, R1oBQEOJUT5B5BLI9I.csHigh entropy of concatenated method names: 'ToString', 'ttwUJ6iNy4', 'YQmUo1r1fS', 'pMDUx9tN9F', 'VvLUDBIVmR', 'fqnUt6evvl', 'G8nUCviLYL', 'S46UQbbYtb', 'ihBUsPW470', 'xDZU83ECrS'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, yYex5M0Fb9d9vCYsJy.csHigh entropy of concatenated method names: 'jPUANjhKmk', 'N0YAVqL97Z', 'EHeAO8uJRK', 'xWxAwIRwIJ', 'ebfA198WD0', 'O26A93ZG2D', 'F4FA3BGUNh', 'miiAkdJOdr', 'aUFAhBFiIr', 'BpJAIsC2E7'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, pdGFg3XTNgk33RALG8.csHigh entropy of concatenated method names: 'bM5KcxW2gM', 'Lo2KAsyNSY', 'qOFKu0wo74', 'TgGKyLdXFY', 'Pt0K6ovnjM', 'Qysu1B5EaD', 'lt6u93Zvh2', 'DQBu31hpND', 'SoaukPCjQV', 'caAuhVh7Kj'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, YnvJjTAnNmihZSjDMM.csHigh entropy of concatenated method names: 'Dispose', 'kEiHhWRBtb', 'MNQSo0j6YH', 'ANwRRCAKac', 'Fj2HINnvnp', 'uYOHzbchhu', 'ProcessDialogKey', 'iTaSB3F7gX', 'DgaSHOeEFO', 'xkgSSoKROH'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, d2NnvnkpGYObchhuKT.csHigh entropy of concatenated method names: 'mOKgM0jeFh', 'iF9gAbm9Fl', 'g8xgr6UMHO', 'uG0gudCmpR', 'xPbgKbaX5P', 'V9rgyutwaV', 'JEUg6UYdu5', 'OAYgdfqhkM', 'BIkgpSCCgi', 'NSQgFXaa1H'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, XSaccbSuQjsahpQDZ8.csHigh entropy of concatenated method names: 'rdGiA1y0t', 'kwsqDI4cw', 'Yyo5UpPIg', 'zAdfSL7P4', 'mkja6c86b', 'MeQvAvxf3', 'P1OOwf3ra2Y0tx7g2k', 'wspbugi2h03ugJuOFe', 'P44gaISDL', 'jYtY3Qphv'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, ucl6GTCKFMgIfewJUq.csHigh entropy of concatenated method names: 'zftKO7MSe6', 'msPKw4iTWD', 'UPdK1IgZKl', 'ToString', 'idqK9mdK8f', 'L36K3tHX5L', 'A1OowUv03WS4MJLyC6N', 'Qip0B8vo8ZinssaMc8p', 'BSGFe7vIYdGgr28b4ye', 'vefILuvyItsMM2QuSUD'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, NBUNKKwdpFD2sRYih3.csHigh entropy of concatenated method names: 'IWvEpHMvWe', 'dfIEFuK69y', 'ToString', 'ytMEM4Pd2r', 'bkQEAQ7jwg', 'NjXEraZuoM', 'pLUEu5PT55', 'HOHEKH1uCl', 'bmpEyl9AvV', 'xYQE6jXSNf'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, ap2pVR8qDlIvkU6pII.csHigh entropy of concatenated method names: 'IwnyeJriJ8', 'SkeymjoAaT', 'nmVyiwfYtY', 'ACHyqp9Ox6', 'utvynUI747', 'Yhjy5Aq0br', 'hJdyfhIY37', 'eVwy0fij5L', 'Aipyaq4ucP', 'bEJyvfsKUQ'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, j60JomQwKbPv1l24XR.csHigh entropy of concatenated method names: 'KWZyMM1Dj9', 'NXgyrekFIn', 'F16yKB270t', 'YtOKIouteu', 'lY0KzDMjGL', 'tODyB5dfvW', 'a7vyHxSJuZ', 'kR4yS9Ekfg', 'g3MyldQlvu', 'E5EyjrH7XX'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, E3F7gXh0gaOeEFOTkg.csHigh entropy of concatenated method names: 'OnAgX9Qgp9', 'pIrgoVV3um', 'pcHgx9uBMC', 'rsygDucbsM', 'kVVgNMV2Uc', 'w5Ogt5PPxJ', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, LMOT6UNdReeVWoPAID.csHigh entropy of concatenated method names: 'Pb5Z4wLua6', 'W7OZbtuOmM', 'jY2ZNHjCqu', 'apaZV8Fc02', 'DruZomdYKj', 'bleZxAaVlV', 'dpfZD1KQEJ', 'KUCZt1NjhZ', 'FXZZCNkKLN', 'LMRZQhig0o'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, oGYcpcvq7PRQIK6iEx.csHigh entropy of concatenated method names: 'W0Eun5SKet', 'DjyufjUXwv', 'TRCrxye8QF', 'hJ0rDfY7CA', 'Y2rrtt9IKG', 'rxXrCULcxh', 'eOSrQ9kAp4', 'c7MrshZ5Ww', 'RJZr8cuda0', 'F7Er4X0UB1'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, FIrm0jHlMQoThYVr9ZY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'R4qYNwQuZ7', 'pIOYVMGDN3', 'OZrYOkBQR0', 'HMHYwxkkLK', 'bIBY1XYVgc', 'L4PY9OuoSG', 'WXwY3IFlXe'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, mFhgPy2nR54giMNkmJ.csHigh entropy of concatenated method names: 'ieIP0lLGdA', 'v4EPamL9qp', 'fodPXsXfV7', 'DeoPoj4tHC', 'EYPPDOfMjq', 'Y5PPtSk8rv', 'V5hPQ9sGUp', 'WWjPslRVHN', 'KZDP4cthVx', 'lojPJN8jF0'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, VNK5t567Ta80gukmJr.csHigh entropy of concatenated method names: 'EC1lcTh3do', 'OaHlMIhdPu', 'FKwlAsHtqR', 'nvclrmUY5B', 'KrJluifijM', 'Df6lKIClLy', 'iyMlyhnkxk', 'gW6l64Bjh5', 'NLolddIO6i', 'cpLlpCE3gZ'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, RO7QEkjQXdeu77xcCL.csHigh entropy of concatenated method names: 'TvmHyYex5M', 'mb9H6d9vCY', 'Ah1Hp57xKi', 'fcIHF5ZGYc', 'i6iHZExUdG', 'mg3HUTNgk3', 'MT8xilRxCpyx8JKOcx', 'MAM1FvYujOFaHpyNGb', 'hvUHHZbfgC', 'BVkHlDqHGQ'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, g5N5xqah157xKiMcI5.csHigh entropy of concatenated method names: 'XwwrqUcsCE', 'KkOr5ZQOIS', 'ATBr0AUbsF', 'UOpraXXVUZ', 'oiYrZum0iC', 'i7arUKkdPx', 'xbbrEcT9jd', 'XRMrg5yUMK', 'cXur7ffgE5', 'kRmrYxRBw0'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, HKROHvIde0F9Vhk3N4.csHigh entropy of concatenated method names: 'Xjn7HC1NkA', 'LYY7lsOMkp', 'EgC7jBSJhG', 'jBK7MxDgO7', 'ufM7A7MgtH', 'TnV7usUria', 'ST17KjII7V', 'uhvg3VvjSj', 'TM5gkAq6Q5', 'ctLghaR2fT'
                Source: 0.2.Bill Of Lading.exe.432b1b0.2.raw.unpack, qwJAvL92EgDZ8B25LL.csHigh entropy of concatenated method names: 'aV4EkEn7lR', 'iXFEIyhkZp', 'Na9gBUYTvc', 'BeLgHLbgSx', 'wbFEJ0ywfe', 'KKKEbFdZwJ', 'vqcE2GpN5d', 'rnmENAyKe0', 'dOGEVPtEJ6', 'SjdEO7VelM'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, WsdF1GHByCfG39n34hG.csHigh entropy of concatenated method names: 'XTs7ejQMdT', 'FEl7mXO3NH', 'Mro7is3dOB', 'AbT7qGhn8E', 'TrX7niYG7s', 'jyk75k8438', 'vKn7fCvmJL', 'OJP709tXqf', 'ney7aAyiZP', 'gx87vECJ1L'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, R1oBQEOJUT5B5BLI9I.csHigh entropy of concatenated method names: 'ToString', 'ttwUJ6iNy4', 'YQmUo1r1fS', 'pMDUx9tN9F', 'VvLUDBIVmR', 'fqnUt6evvl', 'G8nUCviLYL', 'S46UQbbYtb', 'ihBUsPW470', 'xDZU83ECrS'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, yYex5M0Fb9d9vCYsJy.csHigh entropy of concatenated method names: 'jPUANjhKmk', 'N0YAVqL97Z', 'EHeAO8uJRK', 'xWxAwIRwIJ', 'ebfA198WD0', 'O26A93ZG2D', 'F4FA3BGUNh', 'miiAkdJOdr', 'aUFAhBFiIr', 'BpJAIsC2E7'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, pdGFg3XTNgk33RALG8.csHigh entropy of concatenated method names: 'bM5KcxW2gM', 'Lo2KAsyNSY', 'qOFKu0wo74', 'TgGKyLdXFY', 'Pt0K6ovnjM', 'Qysu1B5EaD', 'lt6u93Zvh2', 'DQBu31hpND', 'SoaukPCjQV', 'caAuhVh7Kj'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, YnvJjTAnNmihZSjDMM.csHigh entropy of concatenated method names: 'Dispose', 'kEiHhWRBtb', 'MNQSo0j6YH', 'ANwRRCAKac', 'Fj2HINnvnp', 'uYOHzbchhu', 'ProcessDialogKey', 'iTaSB3F7gX', 'DgaSHOeEFO', 'xkgSSoKROH'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, d2NnvnkpGYObchhuKT.csHigh entropy of concatenated method names: 'mOKgM0jeFh', 'iF9gAbm9Fl', 'g8xgr6UMHO', 'uG0gudCmpR', 'xPbgKbaX5P', 'V9rgyutwaV', 'JEUg6UYdu5', 'OAYgdfqhkM', 'BIkgpSCCgi', 'NSQgFXaa1H'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, XSaccbSuQjsahpQDZ8.csHigh entropy of concatenated method names: 'rdGiA1y0t', 'kwsqDI4cw', 'Yyo5UpPIg', 'zAdfSL7P4', 'mkja6c86b', 'MeQvAvxf3', 'P1OOwf3ra2Y0tx7g2k', 'wspbugi2h03ugJuOFe', 'P44gaISDL', 'jYtY3Qphv'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, ucl6GTCKFMgIfewJUq.csHigh entropy of concatenated method names: 'zftKO7MSe6', 'msPKw4iTWD', 'UPdK1IgZKl', 'ToString', 'idqK9mdK8f', 'L36K3tHX5L', 'A1OowUv03WS4MJLyC6N', 'Qip0B8vo8ZinssaMc8p', 'BSGFe7vIYdGgr28b4ye', 'vefILuvyItsMM2QuSUD'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, NBUNKKwdpFD2sRYih3.csHigh entropy of concatenated method names: 'IWvEpHMvWe', 'dfIEFuK69y', 'ToString', 'ytMEM4Pd2r', 'bkQEAQ7jwg', 'NjXEraZuoM', 'pLUEu5PT55', 'HOHEKH1uCl', 'bmpEyl9AvV', 'xYQE6jXSNf'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, ap2pVR8qDlIvkU6pII.csHigh entropy of concatenated method names: 'IwnyeJriJ8', 'SkeymjoAaT', 'nmVyiwfYtY', 'ACHyqp9Ox6', 'utvynUI747', 'Yhjy5Aq0br', 'hJdyfhIY37', 'eVwy0fij5L', 'Aipyaq4ucP', 'bEJyvfsKUQ'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, j60JomQwKbPv1l24XR.csHigh entropy of concatenated method names: 'KWZyMM1Dj9', 'NXgyrekFIn', 'F16yKB270t', 'YtOKIouteu', 'lY0KzDMjGL', 'tODyB5dfvW', 'a7vyHxSJuZ', 'kR4yS9Ekfg', 'g3MyldQlvu', 'E5EyjrH7XX'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, E3F7gXh0gaOeEFOTkg.csHigh entropy of concatenated method names: 'OnAgX9Qgp9', 'pIrgoVV3um', 'pcHgx9uBMC', 'rsygDucbsM', 'kVVgNMV2Uc', 'w5Ogt5PPxJ', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, LMOT6UNdReeVWoPAID.csHigh entropy of concatenated method names: 'Pb5Z4wLua6', 'W7OZbtuOmM', 'jY2ZNHjCqu', 'apaZV8Fc02', 'DruZomdYKj', 'bleZxAaVlV', 'dpfZD1KQEJ', 'KUCZt1NjhZ', 'FXZZCNkKLN', 'LMRZQhig0o'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, oGYcpcvq7PRQIK6iEx.csHigh entropy of concatenated method names: 'W0Eun5SKet', 'DjyufjUXwv', 'TRCrxye8QF', 'hJ0rDfY7CA', 'Y2rrtt9IKG', 'rxXrCULcxh', 'eOSrQ9kAp4', 'c7MrshZ5Ww', 'RJZr8cuda0', 'F7Er4X0UB1'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, FIrm0jHlMQoThYVr9ZY.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'R4qYNwQuZ7', 'pIOYVMGDN3', 'OZrYOkBQR0', 'HMHYwxkkLK', 'bIBY1XYVgc', 'L4PY9OuoSG', 'WXwY3IFlXe'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, mFhgPy2nR54giMNkmJ.csHigh entropy of concatenated method names: 'ieIP0lLGdA', 'v4EPamL9qp', 'fodPXsXfV7', 'DeoPoj4tHC', 'EYPPDOfMjq', 'Y5PPtSk8rv', 'V5hPQ9sGUp', 'WWjPslRVHN', 'KZDP4cthVx', 'lojPJN8jF0'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, VNK5t567Ta80gukmJr.csHigh entropy of concatenated method names: 'EC1lcTh3do', 'OaHlMIhdPu', 'FKwlAsHtqR', 'nvclrmUY5B', 'KrJluifijM', 'Df6lKIClLy', 'iyMlyhnkxk', 'gW6l64Bjh5', 'NLolddIO6i', 'cpLlpCE3gZ'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, RO7QEkjQXdeu77xcCL.csHigh entropy of concatenated method names: 'TvmHyYex5M', 'mb9H6d9vCY', 'Ah1Hp57xKi', 'fcIHF5ZGYc', 'i6iHZExUdG', 'mg3HUTNgk3', 'MT8xilRxCpyx8JKOcx', 'MAM1FvYujOFaHpyNGb', 'hvUHHZbfgC', 'BVkHlDqHGQ'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, g5N5xqah157xKiMcI5.csHigh entropy of concatenated method names: 'XwwrqUcsCE', 'KkOr5ZQOIS', 'ATBr0AUbsF', 'UOpraXXVUZ', 'oiYrZum0iC', 'i7arUKkdPx', 'xbbrEcT9jd', 'XRMrg5yUMK', 'cXur7ffgE5', 'kRmrYxRBw0'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, HKROHvIde0F9Vhk3N4.csHigh entropy of concatenated method names: 'Xjn7HC1NkA', 'LYY7lsOMkp', 'EgC7jBSJhG', 'jBK7MxDgO7', 'ufM7A7MgtH', 'TnV7usUria', 'ST17KjII7V', 'uhvg3VvjSj', 'TM5gkAq6Q5', 'ctLghaR2fT'
                Source: 0.2.Bill Of Lading.exe.b570000.4.raw.unpack, qwJAvL92EgDZ8B25LL.csHigh entropy of concatenated method names: 'aV4EkEn7lR', 'iXFEIyhkZp', 'Na9gBUYTvc', 'BeLgHLbgSx', 'wbFEJ0ywfe', 'KKKEbFdZwJ', 'vqcE2GpN5d', 'rnmENAyKe0', 'dOGEVPtEJ6', 'SjdEO7VelM'

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 7096, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: E10000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: 2920000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: 2750000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: 8D20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: 77C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: 9D20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: AD20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: B5D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: C5D0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: 16B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: 32F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: 52F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6073Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2143Jump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exe TID: 6216Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3128Thread sleep time: -5534023222112862s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5216Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: Bill Of Lading.exe, 00000004.00000002.2929525597.0000000001718000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllZ
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeCode function: 4_2_016BC168 LdrInitializeThunk,LdrInitializeThunk,4_2_016BC168
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe"
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeMemory written: C:\Users\user\Desktop\Bill Of Lading.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeProcess created: C:\Users\user\Desktop\Bill Of Lading.exe "C:\Users\user\Desktop\Bill Of Lading.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Users\user\Desktop\Bill Of Lading.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Users\user\Desktop\Bill Of Lading.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Bill Of Lading.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 7096, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 2516, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Bill Of Lading.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 7096, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 2516, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Bill Of Lading.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Bill Of Lading.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Bill Of Lading.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2930568379.0000000003413000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 7096, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 2516, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Bill Of Lading.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 7096, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 2516, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.Bill Of Lading.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.422f9b8.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Bill Of Lading.exe.4218b98.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 7096, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Bill Of Lading.exe PID: 2516, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                111
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Query Registry
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                11
                Disable or Modify Tools
                1
                Input Capture
                1
                Security Software Discovery
                Remote Desktop Protocol1
                Input Capture
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares11
                Archive Collected Data
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS31
                Virtualization/Sandbox Evasion
                Distributed Component Object Model1
                Data from Local System
                13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Obfuscated Files or Information
                Cached Domain Credentials1
                System Network Configuration Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Software Packing
                DCSync1
                File and Directory Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc Filesystem13
                System Information Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Bill Of Lading.exe39%ReversingLabsByteCode-MSIL.Backdoor.njRAT
                Bill Of Lading.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.fontbureau.com0%URL Reputationsafe
                http://www.fontbureau.com/designersG0%URL Reputationsafe
                http://www.fontbureau.com/designers/?0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.fontbureau.com/designers?0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                http://www.fontbureau.com/designers0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                https://www.chiark.greenend.org.uk/~sgtatham/putty/00%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://crl.m0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://reallyfreegeoip.org0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                https://reallyfreegeoip.org0%URL Reputationsafe
                http://www.fontbureau.com/designers80%URL Reputationsafe
                http://www.fonts.com0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://checkip.dyndns.com0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.97.3
                truetrue
                  unknown
                  checkip.dyndns.com
                  132.226.247.73
                  truefalse
                    unknown
                    checkip.dyndns.org
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.org/xml/173.254.250.72false
                        unknown
                        http://checkip.dyndns.org/false
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.apache.org/licenses/LICENSE-2.0Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://www.fontbureau.comBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designersGBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/?Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cn/bTheBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers?Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://reallyfreegeoip.org/xml/173.254.250.72dBill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            http://reallyfreegeoip.orgdBill Of Lading.exe, 00000004.00000002.2930568379.000000000338B000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://www.tiro.comBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://checkip.dyndns.orgBill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2930568379.0000000003362000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://reallyfreegeoip.org/xml/173.254.250.72lBill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                http://www.fontbureau.com/designersBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.goodfont.co.krBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://www.chiark.greenend.org.uk/~sgtatham/putty/0Bill Of Lading.exefalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.comBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn/cTheBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/staff/dennis.htmBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://crl.mBill Of Lading.exe, 00000004.00000002.2932716235.0000000006968000.00000004.00000020.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cnBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-user.htmlBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://checkip.dyndns.comdBill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://checkip.dyndns.org/qBill Of Lading.exe, 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.jiyu-kobo.co.jp/Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://reallyfreegeoip.orgBill Of Lading.exe, 00000004.00000002.2930568379.000000000338B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.orgdBill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    http://www.galapagosdesign.com/DPleaseBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://reallyfreegeoip.orgBill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8Bill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fonts.comBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sandoll.co.krBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://checkip.dyndns.comBill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.urwpp.deDPleaseBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.zhongyicts.com.cnBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://checkip.dyndns.org/dBill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameBill Of Lading.exe, 00000000.00000002.1730779079.0000000002959000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2930568379.00000000032F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sakkal.comBill Of Lading.exe, 00000000.00000002.1732705433.0000000006A92000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      https://api.telegram.org/bot-/sendDocument?chat_id=Bill Of Lading.exe, 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        unknown
                                        https://reallyfreegeoip.org/xml/Bill Of Lading.exe, 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2930568379.000000000336E000.00000004.00000800.00020000.00000000.sdmp, Bill Of Lading.exe, 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        188.114.97.3
                                        reallyfreegeoip.orgEuropean Union
                                        13335CLOUDFLARENETUStrue
                                        132.226.247.73
                                        checkip.dyndns.comUnited States
                                        16989UTMEMUSfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1544350
                                        Start date and time:2024-10-29 10:10:08 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 5m 43s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:9
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:Bill Of Lading.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@6/6@2/2
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 84
                                        • Number of non-executed functions: 48
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtCreateKey calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                        • VT rate limit hit for: Bill Of Lading.exe
                                        TimeTypeDescription
                                        05:10:59API Interceptor3x Sleep call for process: Bill Of Lading.exe modified
                                        05:11:02API Interceptor10x Sleep call for process: powershell.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        188.114.97.3rPO_28102400.exeGet hashmaliciousLokibotBrowse
                                        • ghcopz.shop/ClarkB/PWS/fre.php
                                        PbfYaIvR5B.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                        • windowsxp.top/ExternaltoPhppollcpuupdateTrafficpublic.php
                                        SR3JZpolPo.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                        • xilloolli.com/api.php?status=1&wallets=0&av=1
                                        5Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                                        • artvisions-autoinsider.com/8bkjdSdfjCe/index.php
                                        PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                        • www.cc101.pro/4hfb/
                                        QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • filetransfer.io/data-package/cDXpxO66/download
                                        Instruction_1928.pdf.lnk.download.lnkGet hashmaliciousLummaCBrowse
                                        • tech-tribune.shop/pLQvfD4d5/index.php
                                        WBCDZ4Z3M2667YBDZ5K4.bin.exeGet hashmaliciousUnknownBrowse
                                        • tech-tribune.shop/pLQvfD4d5/index.php
                                        yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                        • www.rs-ag.com/
                                        https://is.gd/6NgVrQGet hashmaliciousHTMLPhisherBrowse
                                        • aa.opencompanies.co.uk/vEXJm/
                                        132.226.247.73Proforma-Invoice#018879TT0100..docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • checkip.dyndns.org/
                                        na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        n#U00ba 7064-2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        SOLICITUD URGENTE RFQ-05567.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        PILNE ZAPYTANIE RFQ-05567-2024.10.25.vbsGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                        • checkip.dyndns.org/
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        reallyfreegeoip.orgProforma-Invoice#018879TT0100..docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        z74fBF2ObiS1g87mbS.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        come.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 188.114.97.3
                                        INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 188.114.97.3
                                        QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.96.3
                                        z19UrgentOrder.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 188.114.97.3
                                        Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 188.114.97.3
                                        #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 188.114.97.3
                                        RFQ_List.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 188.114.97.3
                                        checkip.dyndns.comProforma-Invoice#018879TT0100..docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 193.122.130.0
                                        dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 132.226.247.73
                                        z74fBF2ObiS1g87mbS.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        come.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 132.226.8.169
                                        INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 132.226.8.169
                                        QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 158.101.44.242
                                        z19UrgentOrder.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 193.122.6.168
                                        Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 132.226.247.73
                                        RFQ_List.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 158.101.44.242
                                        z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 132.226.247.73
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        CLOUDFLARENETUSBill_Of _Lading.exeGet hashmaliciousAgentTeslaBrowse
                                        • 172.67.74.152
                                        ST007 SWIFT CONFIRMATION.xlsGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        Proforma-Invoice#018879TT0100..docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 188.114.96.3
                                        swift-copy31072024PDF.htmlGet hashmaliciousHTMLPhisherBrowse
                                        • 1.1.1.1
                                        ST007 SWIFT CONFIRMATION.xlsGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        file.exeGet hashmaliciousLummaCBrowse
                                        • 188.114.96.3
                                        ST007 SWIFT CONFIRMATION.xlsGet hashmaliciousUnknownBrowse
                                        • 188.114.96.3
                                        Transferencia.docGet hashmaliciousQuasarBrowse
                                        • 188.114.96.3
                                        https://clairecarpenter.com/wp-includes/css/pbcmc.php?7112797967704b536932307466507a4373757943784b5463314a54533470796b784f7a456e567130725553383750315338317430677031416341#Email#Get hashmaliciousHTMLPhisherBrowse
                                        • 104.17.25.14
                                        https://inspireelectricale.za.com/u78dqGet hashmaliciousHTMLPhisherBrowse
                                        • 104.17.25.14
                                        UTMEMUSProforma-Invoice#018879TT0100..docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.247.73
                                        dekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 132.226.247.73
                                        come.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 132.226.8.169
                                        INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 132.226.8.169
                                        Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 132.226.247.73
                                        z1RECONFIRMPAYMENTINVOICE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 132.226.247.73
                                        AWB#21138700102.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.8.169
                                        na.docGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.247.73
                                        na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.247.73
                                        na.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        • 132.226.247.73
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        54328bd36c14bd82ddaa0c04b25ed9addekont_001.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        https://docs.google.com/drawings/d/1O7L6jnunpKYYRy1ZXX5DN4ENeZ4pxxWF8BG0mcDdFi0/preview?pli=1ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVenbNRU0UorX7OKjJa9aCYWGEkzuOVKWWWAgOafkEScU8ZjRsxVeGet hashmaliciousHTMLPhisherBrowse
                                        • 188.114.97.3
                                        z74fBF2ObiS1g87mbS.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        https://docs.google.com/drawings/d/1JRNFh_1Cbzym_iLfw5aw8-eo7G0EKRf1L0-MpuWvb2k/preview?pli=1MiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGttUWGqloBvri51h9LRErd3HWCRoBdFauRsSvK8yaHFbMiAYvqGGet hashmaliciousUnknownBrowse
                                        • 188.114.97.3
                                        https://docs.google.com/drawings/d/14Q1EGmG0TWb0poSuSYwhNHZWOm-kG4Jlnk5Hg076lVI/preview?pli=132E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlXEloAdV6HX14O32E7OVeVm3Yu5P8NzksOSE1huGfymTeBDpSWlGet hashmaliciousMamba2FABrowse
                                        • 188.114.97.3
                                        come.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 188.114.97.3
                                        INVOICE.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                        • 188.114.97.3
                                        QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        • 188.114.97.3
                                        z19UrgentOrder.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                        • 188.114.97.3
                                        Fa24c148.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 188.114.97.3
                                        No context
                                        Process:C:\Users\user\Desktop\Bill Of Lading.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):1216
                                        Entropy (8bit):5.34331486778365
                                        Encrypted:false
                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                        Malicious:true
                                        Reputation:high, very likely benign file
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):1172
                                        Entropy (8bit):5.357042452875322
                                        Encrypted:false
                                        SSDEEP:24:3CytZWSKco4KmZjKbm51s4RPT6moUebIKo+mZ9t7J0gt/NKIl9r+q:yyjWSU4xymI4RfoUeW+mZ9tK8ND3
                                        MD5:827C68C8F65D2B0800E6791B34AB6D2E
                                        SHA1:151BC96F9C26C53E02D2E0DA64995A462D0C3B4E
                                        SHA-256:6B22A727792EC2ACE1BC27BF00BECBBD842902F2FD0FC813CF45A21A986377D5
                                        SHA-512:67E9E89C531B2CDF47FCBBA3F036EA66427631A8EBF287A26DD35AFB114AF6E2D945304CBF72B94358245FEED658F9BA6E19B29879AE6488D8DC7A143DCC146D
                                        Malicious:false
                                        Reputation:moderate, very likely benign file
                                        Preview:@...e.................................^..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Reputation:high, very likely benign file
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):60
                                        Entropy (8bit):4.038920595031593
                                        Encrypted:false
                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                        Malicious:false
                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):7.5905964859994235
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                        • Win32 Executable (generic) a (10002005/4) 49.96%
                                        • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        File name:Bill Of Lading.exe
                                        File size:582'152 bytes
                                        MD5:e6d942c53b473fb6f9b53a24a59d083b
                                        SHA1:284b60dfc554bfb5aa78717d510a4b1a702b4598
                                        SHA256:862a367b1e130dc47d08a2d4ce26bec8d85196f00c1a3f6c0df4fc5f099139cd
                                        SHA512:14370b89e3067f9d63696a357b94277ba0b03ab66314d4284759c2054945cee1f5c5b27560032d8708169abd9b7ccca46fbc6584db65e1dfaef7d56f78ff745c
                                        SSDEEP:12288:zpLrqzmjwXGrt2vBe7D0jzxZ6nvIQVg3JyyaazF9z02kR:z4zMwXGri3xgnAQq3J9zot
                                        TLSH:D2C4CFE03F36731ADE696934D619DDBA92B11A787004BAF269DC3B4335CC211AE1CF46
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...{g g..............0.............Z.... ........@.. ....................................@................................
                                        Icon Hash:4d162aaa22324d30
                                        Entrypoint:0x48b35a
                                        Entrypoint Section:.text
                                        Digitally signed:true
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x6720677B [Tue Oct 29 04:41:31 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Signature Valid:false
                                        Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                        Signature Validation Error:The digital signature of the object did not verify
                                        Error Number:-2146869232
                                        Not Before, Not After
                                        • 13/11/2018 00:00:00 08/11/2021 23:59:59
                                        Subject Chain
                                        • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                        Version:3
                                        Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                        Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                        Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                        Serial:7C1118CBBADC95DA3752C46E47A27438
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x8b3080x4f.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x8c0000xc20.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x8ac000x3608
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x8e0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x893600x894007133280c875f7824f20421509594d2baFalse0.8516656705373407data7.597028428709984IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0x8c0000xc200x1000c24774c6162b8c2fc41852af318605acFalse0.385009765625data5.074407163623199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x8e0000xc0x400b4796ad904216ecec9f465b93a434052False0.025390625data0.05585530805374581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_ICON0x8c0c80x823PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.5583293326932309
                                        RT_GROUP_ICON0x8c8fc0x14data1.05
                                        RT_VERSION0x8c9200x2fcdata0.4424083769633508
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-29T10:11:05.807600+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449735132.226.247.7380TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 29, 2024 10:11:03.598928928 CET4973580192.168.2.4132.226.247.73
                                        Oct 29, 2024 10:11:04.588888884 CET4973580192.168.2.4132.226.247.73
                                        Oct 29, 2024 10:11:04.623547077 CET8049735132.226.247.73192.168.2.4
                                        Oct 29, 2024 10:11:04.623568058 CET8049735132.226.247.73192.168.2.4
                                        Oct 29, 2024 10:11:04.623699903 CET4973580192.168.2.4132.226.247.73
                                        Oct 29, 2024 10:11:04.624429941 CET4973580192.168.2.4132.226.247.73
                                        Oct 29, 2024 10:11:04.629726887 CET8049735132.226.247.73192.168.2.4
                                        Oct 29, 2024 10:11:05.497720957 CET8049735132.226.247.73192.168.2.4
                                        Oct 29, 2024 10:11:05.502793074 CET4973580192.168.2.4132.226.247.73
                                        Oct 29, 2024 10:11:05.508090019 CET8049735132.226.247.73192.168.2.4
                                        Oct 29, 2024 10:11:05.766321898 CET8049735132.226.247.73192.168.2.4
                                        Oct 29, 2024 10:11:05.778021097 CET49737443192.168.2.4188.114.97.3
                                        Oct 29, 2024 10:11:05.778121948 CET44349737188.114.97.3192.168.2.4
                                        Oct 29, 2024 10:11:05.778285980 CET49737443192.168.2.4188.114.97.3
                                        Oct 29, 2024 10:11:05.797127008 CET49737443192.168.2.4188.114.97.3
                                        Oct 29, 2024 10:11:05.797162056 CET44349737188.114.97.3192.168.2.4
                                        Oct 29, 2024 10:11:05.807600021 CET4973580192.168.2.4132.226.247.73
                                        Oct 29, 2024 10:11:06.405116081 CET44349737188.114.97.3192.168.2.4
                                        Oct 29, 2024 10:11:06.405277014 CET49737443192.168.2.4188.114.97.3
                                        Oct 29, 2024 10:11:06.410511971 CET49737443192.168.2.4188.114.97.3
                                        Oct 29, 2024 10:11:06.410545111 CET44349737188.114.97.3192.168.2.4
                                        Oct 29, 2024 10:11:06.411039114 CET44349737188.114.97.3192.168.2.4
                                        Oct 29, 2024 10:11:06.461036921 CET49737443192.168.2.4188.114.97.3
                                        Oct 29, 2024 10:11:06.503345966 CET44349737188.114.97.3192.168.2.4
                                        Oct 29, 2024 10:11:06.595527887 CET44349737188.114.97.3192.168.2.4
                                        Oct 29, 2024 10:11:06.595606089 CET44349737188.114.97.3192.168.2.4
                                        Oct 29, 2024 10:11:06.595655918 CET49737443192.168.2.4188.114.97.3
                                        Oct 29, 2024 10:11:06.602061033 CET49737443192.168.2.4188.114.97.3
                                        Oct 29, 2024 10:12:10.906883001 CET8049735132.226.247.73192.168.2.4
                                        Oct 29, 2024 10:12:10.906980038 CET4973580192.168.2.4132.226.247.73
                                        Oct 29, 2024 10:12:45.776834011 CET4973580192.168.2.4132.226.247.73
                                        Oct 29, 2024 10:12:45.782962084 CET8049735132.226.247.73192.168.2.4
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 29, 2024 10:11:03.537297010 CET5147553192.168.2.41.1.1.1
                                        Oct 29, 2024 10:11:03.545453072 CET53514751.1.1.1192.168.2.4
                                        Oct 29, 2024 10:11:05.769470930 CET6247853192.168.2.41.1.1.1
                                        Oct 29, 2024 10:11:05.777307034 CET53624781.1.1.1192.168.2.4
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Oct 29, 2024 10:11:03.537297010 CET192.168.2.41.1.1.10x4035Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                        Oct 29, 2024 10:11:05.769470930 CET192.168.2.41.1.1.10x586fStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Oct 29, 2024 10:11:03.545453072 CET1.1.1.1192.168.2.40x4035No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                        Oct 29, 2024 10:11:03.545453072 CET1.1.1.1192.168.2.40x4035No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                        Oct 29, 2024 10:11:03.545453072 CET1.1.1.1192.168.2.40x4035No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                        Oct 29, 2024 10:11:03.545453072 CET1.1.1.1192.168.2.40x4035No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                        Oct 29, 2024 10:11:03.545453072 CET1.1.1.1192.168.2.40x4035No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                        Oct 29, 2024 10:11:03.545453072 CET1.1.1.1192.168.2.40x4035No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                        Oct 29, 2024 10:11:05.777307034 CET1.1.1.1192.168.2.40x586fNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                        Oct 29, 2024 10:11:05.777307034 CET1.1.1.1192.168.2.40x586fNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                        • reallyfreegeoip.org
                                        • checkip.dyndns.org
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449735132.226.247.73802516C:\Users\user\Desktop\Bill Of Lading.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 29, 2024 10:11:04.624429941 CET151OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Connection: Keep-Alive
                                        Oct 29, 2024 10:11:05.497720957 CET323INHTTP/1.1 200 OK
                                        Date: Tue, 29 Oct 2024 09:11:05 GMT
                                        Content-Type: text/html
                                        Content-Length: 106
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 480e692a7bfcf90d4c312b371dc16c47
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.72</body></html>
                                        Oct 29, 2024 10:11:05.502793074 CET127OUTGET / HTTP/1.1
                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                        Host: checkip.dyndns.org
                                        Oct 29, 2024 10:11:05.766321898 CET323INHTTP/1.1 200 OK
                                        Date: Tue, 29 Oct 2024 09:11:05 GMT
                                        Content-Type: text/html
                                        Content-Length: 106
                                        Connection: keep-alive
                                        Cache-Control: no-cache
                                        Pragma: no-cache
                                        X-Request-ID: 11edbd332b69cb2396ae631520a9dfa7
                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 32 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 173.254.250.72</body></html>


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.449737188.114.97.34432516C:\Users\user\Desktop\Bill Of Lading.exe
                                        TimestampBytes transferredDirectionData
                                        2024-10-29 09:11:06 UTC87OUTGET /xml/173.254.250.72 HTTP/1.1
                                        Host: reallyfreegeoip.org
                                        Connection: Keep-Alive
                                        2024-10-29 09:11:06 UTC887INHTTP/1.1 200 OK
                                        Date: Tue, 29 Oct 2024 09:11:06 GMT
                                        Content-Type: text/xml
                                        Content-Length: 359
                                        Connection: close
                                        apigw-requestid: AZ6gpggEPHcESXQ=
                                        Cache-Control: max-age=31536000
                                        CF-Cache-Status: HIT
                                        Age: 576
                                        Last-Modified: Tue, 29 Oct 2024 09:01:30 GMT
                                        Accept-Ranges: bytes
                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zqEza5ECcq4zh3UMvFoTwnxnXmIBzIQK9AYVUM%2Fbnln9XrZ%2F%2BVE5almMUWKSF3V13%2Bymdc5cuFO%2FKnMblGClS0bJOyl5zTpVDRcC8RJ1qgaPji0qPKefdY01mL47fEUXYNHIG0kQ"}],"group":"cf-nel","max_age":604800}
                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                        Server: cloudflare
                                        CF-RAY: 8da20949cbbae81f-DFW
                                        alt-svc: h3=":443"; ma=86400
                                        server-timing: cfL4;desc="?proto=TCP&rtt=1174&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2405315&cwnd=251&unsent_bytes=0&cid=ed398e5f8f3c2c2f&ts=207&x=0"
                                        2024-10-29 09:11:06 UTC359INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 32 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4b 69 6c 6c 65 65 6e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 36 35 34 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e
                                        Data Ascii: <Response><IP>173.254.250.72</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Killeen</City><ZipCode>76549</ZipCode><TimeZone>America/Chicago</TimeZone>


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:05:10:58
                                        Start date:29/10/2024
                                        Path:C:\Users\user\Desktop\Bill Of Lading.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\Bill Of Lading.exe"
                                        Imagebase:0x560000
                                        File size:582'152 bytes
                                        MD5 hash:E6D942C53B473FB6F9B53A24A59D083B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1731055909.00000000041B7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                        Reputation:low
                                        Has exited:true

                                        Target ID:2
                                        Start time:05:11:01
                                        Start date:29/10/2024
                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\Bill Of Lading.exe"
                                        Imagebase:0x720000
                                        File size:433'152 bytes
                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:3
                                        Start time:05:11:01
                                        Start date:29/10/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff7699e0000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:05:11:01
                                        Start date:29/10/2024
                                        Path:C:\Users\user\Desktop\Bill Of Lading.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\Bill Of Lading.exe"
                                        Imagebase:0xeb0000
                                        File size:582'152 bytes
                                        MD5 hash:E6D942C53B473FB6F9B53A24A59D083B
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.2928507944.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2930568379.0000000003413000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:false

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:12.8%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:1.8%
                                          Total number of Nodes:333
                                          Total number of Limit Nodes:18
                                          execution_graph 41002 72a1ee8 41003 72a1f36 DrawTextExW 41002->41003 41005 72a1f8e 41003->41005 40627 7ab3dae 40628 7ab3d5c 40627->40628 40629 7ab3dd7 40628->40629 40632 7ab5980 40628->40632 40637 7ab5970 40628->40637 40633 7ab5995 40632->40633 40642 7ab5a1e 40633->40642 40661 7ab59b0 40633->40661 40634 7ab59a7 40634->40629 40638 7ab5995 40637->40638 40640 7ab5a1e 12 API calls 40638->40640 40641 7ab59b0 12 API calls 40638->40641 40639 7ab59a7 40639->40629 40640->40639 40641->40639 40643 7ab59ac 40642->40643 40644 7ab5a21 40642->40644 40651 7ab59fe 40643->40651 40679 7ab5de8 40643->40679 40684 7ab5f95 40643->40684 40690 7ab5ef0 40643->40690 40695 7ab6032 40643->40695 40700 7ab6012 40643->40700 40706 7ab633d 40643->40706 40711 7ab5fd9 40643->40711 40715 7ab607b 40643->40715 40721 7ab611b 40643->40721 40727 7ab61e5 40643->40727 40731 7ab5f82 40643->40731 40736 7ab6042 40643->40736 40742 7ab67c2 40643->40742 40749 7ab6223 40643->40749 40754 7ab622e 40643->40754 40644->40634 40651->40634 40662 7ab59da 40661->40662 40663 7ab5de8 2 API calls 40662->40663 40664 7ab622e 2 API calls 40662->40664 40665 7ab6223 2 API calls 40662->40665 40666 7ab67c2 2 API calls 40662->40666 40667 7ab6042 2 API calls 40662->40667 40668 7ab5f82 2 API calls 40662->40668 40669 7ab59fe 40662->40669 40670 7ab61e5 2 API calls 40662->40670 40671 7ab611b 2 API calls 40662->40671 40672 7ab607b 2 API calls 40662->40672 40673 7ab5fd9 2 API calls 40662->40673 40674 7ab633d 2 API calls 40662->40674 40675 7ab6012 2 API calls 40662->40675 40676 7ab6032 2 API calls 40662->40676 40677 7ab5ef0 2 API calls 40662->40677 40678 7ab5f95 2 API calls 40662->40678 40663->40669 40664->40669 40665->40669 40666->40669 40667->40669 40668->40669 40669->40634 40670->40669 40671->40669 40672->40669 40673->40669 40674->40669 40675->40669 40676->40669 40677->40669 40678->40669 40680 7ab5e0a 40679->40680 40758 7ab3940 40680->40758 40762 7ab3934 40680->40762 40685 7ab5fbe 40684->40685 40766 7ab6b20 40685->40766 40771 7ab6b69 40685->40771 40777 7ab6b30 40685->40777 40686 7ab647c 40691 7ab5f13 40690->40691 40790 7ab36b8 40691->40790 40794 7ab36b1 40691->40794 40692 7ab62c0 40696 7ab5fd8 40695->40696 40697 7ab5ff3 40695->40697 40798 7ab30e8 40696->40798 40802 7ab30e0 40696->40802 40697->40651 40701 7ab5fa7 40700->40701 40703 7ab6b69 2 API calls 40701->40703 40704 7ab6b20 2 API calls 40701->40704 40705 7ab6b30 2 API calls 40701->40705 40702 7ab647c 40703->40702 40704->40702 40705->40702 40707 7ab6343 40706->40707 40709 7ab36b8 WriteProcessMemory 40707->40709 40710 7ab36b1 WriteProcessMemory 40707->40710 40708 7ab6375 40709->40708 40710->40708 40713 7ab30e8 Wow64SetThreadContext 40711->40713 40714 7ab30e0 Wow64SetThreadContext 40711->40714 40712 7ab5ff3 40712->40651 40713->40712 40714->40712 40716 7ab6354 40715->40716 40717 7ab64a8 40716->40717 40719 7ab36b8 WriteProcessMemory 40716->40719 40720 7ab36b1 WriteProcessMemory 40716->40720 40718 7ab6375 40719->40718 40720->40718 40722 7ab6121 40721->40722 40724 7ab6b69 2 API calls 40722->40724 40725 7ab6b20 2 API calls 40722->40725 40726 7ab6b30 2 API calls 40722->40726 40723 7ab647c 40724->40723 40725->40723 40726->40723 40729 7ab30e8 Wow64SetThreadContext 40727->40729 40730 7ab30e0 Wow64SetThreadContext 40727->40730 40728 7ab6204 40729->40728 40730->40728 40732 7ab6184 40731->40732 40734 7ab36b8 WriteProcessMemory 40732->40734 40735 7ab36b1 WriteProcessMemory 40732->40735 40733 7ab64d2 40734->40733 40735->40733 40737 7ab605c 40736->40737 40739 7ab6b69 2 API calls 40737->40739 40740 7ab6b20 2 API calls 40737->40740 40741 7ab6b30 2 API calls 40737->40741 40738 7ab647c 40739->40738 40740->40738 40741->40738 40743 7ab6041 40742->40743 40745 7ab5eb4 40743->40745 40746 7ab6b69 2 API calls 40743->40746 40747 7ab6b20 2 API calls 40743->40747 40748 7ab6b30 2 API calls 40743->40748 40744 7ab647c 40746->40744 40747->40744 40748->40744 40750 7ab671b 40749->40750 40806 7ab37a8 40750->40806 40810 7ab37a1 40750->40810 40751 7ab673d 40814 7ab35f8 40754->40814 40818 7ab35f1 40754->40818 40755 7ab624c 40759 7ab39c9 40758->40759 40759->40759 40760 7ab3b2e CreateProcessA 40759->40760 40761 7ab3b8b 40760->40761 40761->40761 40763 7ab39c9 40762->40763 40763->40763 40764 7ab3b2e CreateProcessA 40763->40764 40765 7ab3b8b 40764->40765 40765->40765 40767 7ab6b30 40766->40767 40782 7ab3038 40767->40782 40786 7ab3030 40767->40786 40768 7ab6b58 40768->40686 40772 7ab6b23 40771->40772 40773 7ab6b76 40771->40773 40775 7ab3038 ResumeThread 40772->40775 40776 7ab3030 ResumeThread 40772->40776 40773->40686 40774 7ab6b58 40774->40686 40775->40774 40776->40774 40778 7ab6b45 40777->40778 40780 7ab3038 ResumeThread 40778->40780 40781 7ab3030 ResumeThread 40778->40781 40779 7ab6b58 40779->40686 40780->40779 40781->40779 40783 7ab3078 ResumeThread 40782->40783 40785 7ab30a9 40783->40785 40785->40768 40787 7ab3038 ResumeThread 40786->40787 40789 7ab30a9 40787->40789 40789->40768 40791 7ab3700 WriteProcessMemory 40790->40791 40793 7ab3757 40791->40793 40793->40692 40795 7ab36b8 WriteProcessMemory 40794->40795 40797 7ab3757 40795->40797 40797->40692 40799 7ab312d Wow64SetThreadContext 40798->40799 40801 7ab3175 40799->40801 40801->40697 40803 7ab30e8 Wow64SetThreadContext 40802->40803 40805 7ab3175 40803->40805 40805->40697 40807 7ab37f3 ReadProcessMemory 40806->40807 40809 7ab3837 40807->40809 40809->40751 40811 7ab37a6 ReadProcessMemory 40810->40811 40813 7ab3837 40811->40813 40813->40751 40815 7ab3638 VirtualAllocEx 40814->40815 40817 7ab3675 40815->40817 40817->40755 40819 7ab35f6 VirtualAllocEx 40818->40819 40821 7ab3675 40819->40821 40821->40755 40822 e14668 40823 e14672 40822->40823 40827 e14758 40822->40827 40832 e14210 40823->40832 40825 e1468d 40828 e1477d 40827->40828 40836 e14868 40828->40836 40840 e14858 40828->40840 40833 e1421b 40832->40833 40848 e15c34 40833->40848 40835 e16f8e 40835->40825 40838 e1488f 40836->40838 40837 e1496c 40838->40837 40844 e144d4 40838->40844 40841 e1488f 40840->40841 40842 e1496c 40841->40842 40843 e144d4 CreateActCtxA 40841->40843 40843->40842 40845 e158f8 CreateActCtxA 40844->40845 40847 e159bb 40845->40847 40849 e15c3f 40848->40849 40852 e15c54 40849->40852 40851 e170a5 40851->40835 40853 e15c5f 40852->40853 40856 e15c84 40853->40856 40855 e17182 40855->40851 40857 e15c8f 40856->40857 40860 e15cb4 40857->40860 40859 e17285 40859->40855 40861 e15cbf 40860->40861 40863 e1858b 40861->40863 40866 e1ac38 40861->40866 40862 e185c9 40862->40859 40863->40862 40870 e1cd28 40863->40870 40875 e1ac70 40866->40875 40878 e1ac5f 40866->40878 40867 e1ac4e 40867->40863 40871 e1cd59 40870->40871 40872 e1cd7d 40871->40872 40887 e1cee7 40871->40887 40891 e1cee8 40871->40891 40872->40862 40882 e1ad68 40875->40882 40876 e1ac7f 40876->40867 40879 e1ac70 40878->40879 40881 e1ad68 GetModuleHandleW 40879->40881 40880 e1ac7f 40880->40867 40881->40880 40883 e1ad9c 40882->40883 40884 e1ad79 40882->40884 40883->40876 40884->40883 40885 e1afa0 GetModuleHandleW 40884->40885 40886 e1afcd 40885->40886 40886->40876 40889 e1cef5 40887->40889 40888 e1cf2f 40888->40872 40889->40888 40895 e1bac0 40889->40895 40893 e1cef5 40891->40893 40892 e1cf2f 40892->40872 40893->40892 40894 e1bac0 GetModuleHandleW 40893->40894 40894->40892 40896 e1bacb 40895->40896 40898 e1dc48 40896->40898 40899 e1d0e4 40896->40899 40898->40898 40900 e1d0ef 40899->40900 40901 e15cb4 GetModuleHandleW 40900->40901 40902 e1dcb7 40901->40902 40902->40898 41047 e1d408 41048 e1d40c GetCurrentProcess 41047->41048 41050 e1d4a0 GetCurrentThread 41048->41050 41051 e1d499 41048->41051 41052 e1d4d6 41050->41052 41053 e1d4dd GetCurrentProcess 41050->41053 41051->41050 41052->41053 41056 e1d513 41053->41056 41054 e1d53b GetCurrentThreadId 41055 e1d56c 41054->41055 41056->41054 40903 73798ba 40904 73797f4 40903->40904 40906 7373c18 40904->40906 40907 7379c18 OutputDebugStringW 40906->40907 40909 7379c97 40907->40909 40909->40904 40910 7379738 40911 737975c 40910->40911 40912 7373c18 OutputDebugStringW 40911->40912 40912->40911 40941 e1d650 40942 e1d654 DuplicateHandle 40941->40942 40943 e1d6e6 40942->40943 40913 72ac438 40915 72ac44d 40913->40915 40917 72ac507 40915->40917 40918 72a9860 40915->40918 40916 72ac4dc 40919 72a988b 40918->40919 40920 72a9884 40918->40920 40924 72a98b2 40919->40924 40925 72a854c 40919->40925 40920->40916 40923 72a854c GetCurrentThreadId 40923->40924 40924->40916 40926 72a8557 40925->40926 40927 72a98a8 40926->40927 40928 72a9bcf GetCurrentThreadId 40926->40928 40927->40923 40928->40927 40944 7374c00 40945 7374c0c 40944->40945 40949 7377a60 40945->40949 40954 7377a18 40945->40954 40946 7374c1d 40950 7377a7c 40949->40950 40960 7378987 40950->40960 40969 7378998 40950->40969 40951 7377b26 40951->40946 40955 7377a26 40954->40955 40956 73779d7 40954->40956 40955->40946 40956->40954 40956->40955 40958 7378987 NtQueryInformationProcess 40956->40958 40959 7378998 NtQueryInformationProcess 40956->40959 40957 7377b26 40957->40946 40958->40957 40959->40957 40961 73789b6 40960->40961 40962 737898b 40960->40962 40966 73789c8 NtQueryInformationProcess 40961->40966 40974 73789d8 40961->40974 40967 73789d8 NtQueryInformationProcess 40962->40967 40979 73789c8 40962->40979 40963 73789ba 40963->40951 40964 73789be 40964->40951 40966->40963 40967->40964 40970 73789aa 40969->40970 40972 73789d8 NtQueryInformationProcess 40970->40972 40973 73789c8 NtQueryInformationProcess 40970->40973 40971 73789be 40971->40951 40972->40971 40973->40971 40975 73789f2 40974->40975 40985 7378a9a 40975->40985 40989 7378aa8 40975->40989 40976 7378a15 40976->40963 40980 73789d2 40979->40980 40981 7378a4e 40979->40981 40983 7378a9a NtQueryInformationProcess 40980->40983 40984 7378aa8 NtQueryInformationProcess 40980->40984 40981->40964 40982 7378a15 40982->40964 40983->40982 40984->40982 40986 7378a9f 40985->40986 40993 7373b8c 40986->40993 40990 7378aca 40989->40990 40991 7373b8c NtQueryInformationProcess 40990->40991 40992 7378b53 40991->40992 40992->40976 40994 7378c08 NtQueryInformationProcess 40993->40994 40996 7378b53 40994->40996 40996->40976 41011 72ae6f0 41012 72ae6f4 41011->41012 41013 72ae7bb 41012->41013 41014 72ae7a6 41012->41014 41015 72ae100 3 API calls 41013->41015 41019 72ae100 41014->41019 41017 72ae7ca 41015->41017 41020 72ae10b 41019->41020 41021 72ae7b1 41020->41021 41024 72af100 41020->41024 41030 72af110 41020->41030 41036 72ae130 41024->41036 41027 72af137 41027->41021 41028 72af160 CreateIconFromResourceEx 41029 72af1de 41028->41029 41029->41021 41031 72af12a 41030->41031 41032 72ae130 CreateIconFromResourceEx 41030->41032 41033 72af137 41031->41033 41034 72af160 CreateIconFromResourceEx 41031->41034 41032->41031 41033->41021 41035 72af1de 41034->41035 41035->41021 41037 72af160 CreateIconFromResourceEx 41036->41037 41038 72af12a 41037->41038 41038->41027 41038->41028 40929 72a9831 40930 72a9830 40929->40930 40930->40929 40931 72a9828 40930->40931 40933 72a9860 GetCurrentThreadId 40930->40933 40935 72a9850 40930->40935 40932 72a9846 40933->40932 40936 72a9860 40935->40936 40937 72a854c GetCurrentThreadId 40936->40937 40940 72a9884 40936->40940 40938 72a98a8 40937->40938 40939 72a854c GetCurrentThreadId 40938->40939 40939->40940 40940->40932 41039 7ab6bf0 41040 7ab6c16 41039->41040 41042 7ab6d7b 41039->41042 41040->41042 41043 7ab43b4 41040->41043 41044 7ab6e70 PostMessageW 41043->41044 41046 7ab6edc 41044->41046 41046->41040 40997 7ab3d95 40999 7ab3d5c 40997->40999 40998 7ab3dd7 40999->40998 41000 7ab5980 12 API calls 40999->41000 41001 7ab5970 12 API calls 40999->41001 41000->40998 41001->40998

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 294 72ae100-72ae810 298 72aecf3-72aed5c 294->298 299 72ae816-72ae81b 294->299 306 72aed63-72aedeb 298->306 299->298 300 72ae821-72ae83e 299->300 300->306 307 72ae844-72ae848 300->307 353 72aedf6-72aee76 306->353 308 72ae84a-72ae854 call 72a512c 307->308 309 72ae857-72ae85b 307->309 308->309 310 72ae86a-72ae871 309->310 311 72ae85d-72ae867 call 72a512c 309->311 316 72ae98c-72ae991 310->316 317 72ae877-72ae8a7 310->317 311->310 321 72ae999-72ae99e 316->321 322 72ae993-72ae997 316->322 328 72af076-72af08e 317->328 331 72ae8ad-72ae980 call 72ab878 * 2 317->331 325 72ae9b0-72ae9e0 call 72ae110 * 3 321->325 322->321 324 72ae9a0-72ae9a4 322->324 327 72ae9aa-72ae9ad 324->327 324->328 325->353 354 72ae9e6-72ae9e9 325->354 327->325 339 72af090-72af093 328->339 340 72af094-72af09c 328->340 331->316 361 72ae982 331->361 339->340 343 72af09e-72af0aa 340->343 344 72af0ac 340->344 349 72af0af-72af0b4 343->349 344->349 368 72aee7d-72aeeff 353->368 354->353 356 72ae9ef-72ae9f1 354->356 356->353 359 72ae9f7-72aea2c 356->359 359->368 369 72aea32-72aea3b 359->369 361->316 375 72aef07-72aef89 368->375 370 72aeb9e-72aeba2 369->370 371 72aea41-72aea9b call 72ae110 * 2 call 72ae120 * 2 369->371 374 72aeba8-72aebac 370->374 370->375 416 72aeaad 371->416 417 72aea9d-72aeaa6 371->417 378 72aebb2-72aebb8 374->378 379 72aef91-72aefbe 374->379 375->379 382 72aebba 378->382 383 72aebbc-72aebf1 378->383 393 72aefc5-72af045 379->393 387 72aebf8-72aebfe 382->387 383->387 392 72aec04-72aec0c 387->392 387->393 398 72aec0e-72aec12 392->398 399 72aec13-72aec15 392->399 451 72af04c-72af06e 393->451 398->399 404 72aec77-72aec7d 399->404 405 72aec17-72aec3b 399->405 410 72aec7f-72aec9a 404->410 411 72aec9c-72aecca 404->411 436 72aec3d-72aec42 405->436 437 72aec44-72aec48 405->437 430 72aecd2-72aecde 410->430 411->430 422 72aeab1-72aeab3 416->422 417->422 423 72aeaa8-72aeaab 417->423 431 72aeaba-72aeabe 422->431 432 72aeab5 422->432 423->422 430->451 452 72aece4-72aecf0 430->452 434 72aeacc-72aead2 431->434 435 72aeac0-72aeac7 431->435 432->431 438 72aeadc-72aeae1 434->438 439 72aead4-72aeada 434->439 440 72aeb69-72aeb6d 435->440 441 72aec54-72aec65 436->441 437->328 443 72aec4e-72aec51 437->443 447 72aeae7-72aeaed 438->447 439->447 449 72aeb6f-72aeb89 440->449 450 72aeb8c-72aeb98 440->450 486 72aec67 call 72af100 441->486 487 72aec67 call 72af110 441->487 443->441 456 72aeaef-72aeaf1 447->456 457 72aeaf3-72aeaf8 447->457 449->450 450->370 450->371 451->328 454 72aec6d-72aec75 454->430 461 72aeafa-72aeb0c 456->461 457->461 467 72aeb0e-72aeb14 461->467 468 72aeb16-72aeb1b 461->468 469 72aeb21-72aeb28 467->469 468->469 471 72aeb2a-72aeb2c 469->471 472 72aeb2e 469->472 476 72aeb33-72aeb3e 471->476 472->476 478 72aeb62 476->478 479 72aeb40-72aeb43 476->479 478->440 479->440 481 72aeb45-72aeb4b 479->481 482 72aeb4d-72aeb50 481->482 483 72aeb52-72aeb5b 481->483 482->478 482->483 483->440 485 72aeb5d-72aeb60 483->485 485->440 485->478 486->454 487->454
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733598354.00000000072A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_72a0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Hbq$Hbq$Hbq$Hbq$Hbq
                                          • API String ID: 0-1677660839
                                          • Opcode ID: 2cc17111531de54501763e24d4e082e4849a22280c9973bfff7d8c17d15321e9
                                          • Instruction ID: d369c4081e51c38c731752169e8ed95298b47b1a8f616bc36c796ff0926b3993
                                          • Opcode Fuzzy Hash: 2cc17111531de54501763e24d4e082e4849a22280c9973bfff7d8c17d15321e9
                                          • Instruction Fuzzy Hash: EA32AE70E10218DFDB54DFB9C8917AEBBB2FF84300F1585A9D00AAB395DA349D46CB91
                                          APIs
                                          • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 07378C87
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: InformationProcessQuery
                                          • String ID:
                                          • API String ID: 1778838933-0
                                          • Opcode ID: 236d9ab10e3f4bfad58f659d47a8addb81be37b51827ab34974ac3ed38d8904f
                                          • Instruction ID: 7a502227f8ee497a5400573c48637e074c9ebbc21219931d5eb508675ef053fa
                                          • Opcode Fuzzy Hash: 236d9ab10e3f4bfad58f659d47a8addb81be37b51827ab34974ac3ed38d8904f
                                          • Instruction Fuzzy Hash: 263138B5905349DFCB10CFA9E984ADEFFB4FB09310F10815AE959A7350C334AA55CBA1
                                          APIs
                                          • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 07378C87
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: InformationProcessQuery
                                          • String ID:
                                          • API String ID: 1778838933-0
                                          • Opcode ID: 07e73ddbc6cdc6e01f77dbe0bcfc647d3e4582e01f4ff5df82673bf7f6d23e8b
                                          • Instruction ID: 2719ad2acaf046e8edf59b176f5e1d0695262fa8dee8f35bae3e91aaff8cc9c9
                                          • Opcode Fuzzy Hash: 07e73ddbc6cdc6e01f77dbe0bcfc647d3e4582e01f4ff5df82673bf7f6d23e8b
                                          • Instruction Fuzzy Hash: 70210FB5901349DFCB10CF9AD988ADEFBF4FB48310F10842AEA58A7210C374A944CFA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e47deacf25a9ec32266681bc06a7d881816e21f7521f733840f438dcfd24176c
                                          • Instruction ID: 7c4dff320213f18164bae15f99cd1872cac0fb2a88f7e2b0055a045fa1567ed3
                                          • Opcode Fuzzy Hash: e47deacf25a9ec32266681bc06a7d881816e21f7521f733840f438dcfd24176c
                                          • Instruction Fuzzy Hash: D9428EB4E01219CFEB64CF69D994B9DBBB6FB48300F5081A9E809A7355D734AE81CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 147c4ab75639feac1d6d8b216e231cdd549ba87e81d3297a900d2e92dcbcbed5
                                          • Instruction ID: 91770448f680bf64a997250cf57052b4f9cd69293fd4cc2115ea73868c70b757
                                          • Opcode Fuzzy Hash: 147c4ab75639feac1d6d8b216e231cdd549ba87e81d3297a900d2e92dcbcbed5
                                          • Instruction Fuzzy Hash: 9A32E3B0901259CFEB64DF69C580A8EFBF2BF48315F55D195E408AB212DB30E981CFA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733598354.00000000072A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_72a0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c1cd2b34fb6365440ee8bcb18705ace7da5342ccf429958e31c9b1681b02294
                                          • Instruction ID: 76c58b1b8f5ec736f2fa5d9f13940cd600d5753fc4cb8c54654bd5b2a048b84b
                                          • Opcode Fuzzy Hash: 4c1cd2b34fb6365440ee8bcb18705ace7da5342ccf429958e31c9b1681b02294
                                          • Instruction Fuzzy Hash: C4C16AB0E10219EFCB14CF69C88179EBBB2BF89300F15C5AAD409AB255DB30D986CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cdf35fcc46c9aedb25b9a00aea5fe11606fc645ebd880963b251f9fbd000448c
                                          • Instruction ID: 85f4a47e0e7678ae7d35b92500f9a93589822f6415a5c530f6b93aad3988c54f
                                          • Opcode Fuzzy Hash: cdf35fcc46c9aedb25b9a00aea5fe11606fc645ebd880963b251f9fbd000448c
                                          • Instruction Fuzzy Hash: 7961A3B4E01218CFEB18CF6AD994B9DBBB6FF88300F14C1AAD809A7255D735A941CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2215445b88ca55d7d29fc8c72f6f6dc7fd97331115e765fe9ac4c8f3ea01cba6
                                          • Instruction ID: 0324bfb4a0ec8b31cc4577e81141195aec71ea4f58b6629ef51908fd06b8c522
                                          • Opcode Fuzzy Hash: 2215445b88ca55d7d29fc8c72f6f6dc7fd97331115e765fe9ac4c8f3ea01cba6
                                          • Instruction Fuzzy Hash: C341D9B1E006198FEB58CF6AC89179EBBB2FF89300F10C1AAD55CA7255EB341A458F51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5e0ba62eef996d29e3c6bb5118d603ef260973b7f48e5217f500ed1dcc2a1832
                                          • Instruction ID: adf067fb93b857ff46ac33d4a7fe7916745832b93a43488a047691cb828ac9dc
                                          • Opcode Fuzzy Hash: 5e0ba62eef996d29e3c6bb5118d603ef260973b7f48e5217f500ed1dcc2a1832
                                          • Instruction Fuzzy Hash: 913145B0D086588BEB18CFA7D9443EEBFFAAFCA300F04D1AAD40D66255D7780545CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f0de1639b21cd6ef470d5ed7b818ea442c02f2be826931f670791a2390733fae
                                          • Instruction ID: c6f18eb31148dced088b1f3885b0b7a035217a75159ddb7901ced07b0beea45a
                                          • Opcode Fuzzy Hash: f0de1639b21cd6ef470d5ed7b818ea442c02f2be826931f670791a2390733fae
                                          • Instruction Fuzzy Hash: 8521B4B0D186188BEB18CFABD9453EEBFBAAFC9300F14D16AD40D66254DB780945CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 488 e1d3f8-e1d406 489 e1d408-e1d40b 488->489 490 e1d40c-e1d497 GetCurrentProcess 488->490 489->490 494 e1d4a0-e1d4d4 GetCurrentThread 490->494 495 e1d499-e1d49f 490->495 496 e1d4d6-e1d4dc 494->496 497 e1d4dd-e1d511 GetCurrentProcess 494->497 495->494 496->497 498 e1d513-e1d519 497->498 499 e1d51a-e1d535 call e1d5d9 497->499 498->499 503 e1d53b-e1d56a GetCurrentThreadId 499->503 504 e1d573-e1d5d5 503->504 505 e1d56c-e1d572 503->505 505->504
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00E1D486
                                          • GetCurrentThread.KERNEL32 ref: 00E1D4C3
                                          • GetCurrentProcess.KERNEL32 ref: 00E1D500
                                          • GetCurrentThreadId.KERNEL32 ref: 00E1D559
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730377363.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e10000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 06af346f3fbc1cc671faa58a84d17032d407797fd1ad0b904e28b36439331a3c
                                          • Instruction ID: d8b3d2b190f797542edcd5667dffd97ae7a7c43b6adc3d0ec0a46f33f0a7dc3e
                                          • Opcode Fuzzy Hash: 06af346f3fbc1cc671faa58a84d17032d407797fd1ad0b904e28b36439331a3c
                                          • Instruction Fuzzy Hash: 755159B0904249DFDB14DFAAD9487DEBBF1EF88304F208059E059B7361D774A984CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 512 e1d408-e1d497 GetCurrentProcess 517 e1d4a0-e1d4d4 GetCurrentThread 512->517 518 e1d499-e1d49f 512->518 519 e1d4d6-e1d4dc 517->519 520 e1d4dd-e1d511 GetCurrentProcess 517->520 518->517 519->520 521 e1d513-e1d519 520->521 522 e1d51a-e1d535 call e1d5d9 520->522 521->522 526 e1d53b-e1d56a GetCurrentThreadId 522->526 527 e1d573-e1d5d5 526->527 528 e1d56c-e1d572 526->528 528->527
                                          APIs
                                          • GetCurrentProcess.KERNEL32 ref: 00E1D486
                                          • GetCurrentThread.KERNEL32 ref: 00E1D4C3
                                          • GetCurrentProcess.KERNEL32 ref: 00E1D500
                                          • GetCurrentThreadId.KERNEL32 ref: 00E1D559
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730377363.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e10000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: Current$ProcessThread
                                          • String ID:
                                          • API String ID: 2063062207-0
                                          • Opcode ID: 3725ace2b8f9a95e5ffabed2efcf101e4b165c88c9ed877bbf89a4961578ab1a
                                          • Instruction ID: 17088e48c6c7b11a7ed45bf5c523650c20cfaf20558905e8b7644a3b1b8ecd87
                                          • Opcode Fuzzy Hash: 3725ace2b8f9a95e5ffabed2efcf101e4b165c88c9ed877bbf89a4961578ab1a
                                          • Instruction Fuzzy Hash: 595158B0900209DFDB04DFAAD548BEEBBF1EF88314F208459E019B7361D774A984CB65

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1116 7ab3934-7ab39d5 1118 7ab3a0e-7ab3a2e 1116->1118 1119 7ab39d7-7ab39e1 1116->1119 1126 7ab3a30-7ab3a3a 1118->1126 1127 7ab3a67-7ab3a96 1118->1127 1119->1118 1120 7ab39e3-7ab39e5 1119->1120 1121 7ab3a08-7ab3a0b 1120->1121 1122 7ab39e7-7ab39f1 1120->1122 1121->1118 1124 7ab39f3 1122->1124 1125 7ab39f5-7ab3a04 1122->1125 1124->1125 1125->1125 1128 7ab3a06 1125->1128 1126->1127 1129 7ab3a3c-7ab3a3e 1126->1129 1135 7ab3a98-7ab3aa2 1127->1135 1136 7ab3acf-7ab3b89 CreateProcessA 1127->1136 1128->1121 1131 7ab3a61-7ab3a64 1129->1131 1132 7ab3a40-7ab3a4a 1129->1132 1131->1127 1133 7ab3a4e-7ab3a5d 1132->1133 1134 7ab3a4c 1132->1134 1133->1133 1137 7ab3a5f 1133->1137 1134->1133 1135->1136 1138 7ab3aa4-7ab3aa6 1135->1138 1147 7ab3b8b-7ab3b91 1136->1147 1148 7ab3b92-7ab3c18 1136->1148 1137->1131 1140 7ab3ac9-7ab3acc 1138->1140 1141 7ab3aa8-7ab3ab2 1138->1141 1140->1136 1142 7ab3ab6-7ab3ac5 1141->1142 1143 7ab3ab4 1141->1143 1142->1142 1145 7ab3ac7 1142->1145 1143->1142 1145->1140 1147->1148 1158 7ab3c1a-7ab3c1e 1148->1158 1159 7ab3c28-7ab3c2c 1148->1159 1158->1159 1160 7ab3c20 1158->1160 1161 7ab3c2e-7ab3c32 1159->1161 1162 7ab3c3c-7ab3c40 1159->1162 1160->1159 1161->1162 1165 7ab3c34 1161->1165 1163 7ab3c42-7ab3c46 1162->1163 1164 7ab3c50-7ab3c54 1162->1164 1163->1164 1166 7ab3c48 1163->1166 1167 7ab3c66-7ab3c6d 1164->1167 1168 7ab3c56-7ab3c5c 1164->1168 1165->1162 1166->1164 1169 7ab3c6f-7ab3c7e 1167->1169 1170 7ab3c84 1167->1170 1168->1167 1169->1170 1172 7ab3c85 1170->1172 1172->1172
                                          APIs
                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07AB3B76
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 4fc7d47e3c2a999b764b93610ef845f862ba1f12c34baaf3a8b654ff6ff339d4
                                          • Instruction ID: 166ef5b580ce425ebebaf1135120fca4443f0bc8b225ceb59d5766fed8a0d1a2
                                          • Opcode Fuzzy Hash: 4fc7d47e3c2a999b764b93610ef845f862ba1f12c34baaf3a8b654ff6ff339d4
                                          • Instruction Fuzzy Hash: B3A18CB1D0021ADFDF20CFA9C841BEDBBB6EF45310F1481A9E818A7251DB759985CF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1173 7ab3940-7ab39d5 1175 7ab3a0e-7ab3a2e 1173->1175 1176 7ab39d7-7ab39e1 1173->1176 1183 7ab3a30-7ab3a3a 1175->1183 1184 7ab3a67-7ab3a96 1175->1184 1176->1175 1177 7ab39e3-7ab39e5 1176->1177 1178 7ab3a08-7ab3a0b 1177->1178 1179 7ab39e7-7ab39f1 1177->1179 1178->1175 1181 7ab39f3 1179->1181 1182 7ab39f5-7ab3a04 1179->1182 1181->1182 1182->1182 1185 7ab3a06 1182->1185 1183->1184 1186 7ab3a3c-7ab3a3e 1183->1186 1192 7ab3a98-7ab3aa2 1184->1192 1193 7ab3acf-7ab3b89 CreateProcessA 1184->1193 1185->1178 1188 7ab3a61-7ab3a64 1186->1188 1189 7ab3a40-7ab3a4a 1186->1189 1188->1184 1190 7ab3a4e-7ab3a5d 1189->1190 1191 7ab3a4c 1189->1191 1190->1190 1194 7ab3a5f 1190->1194 1191->1190 1192->1193 1195 7ab3aa4-7ab3aa6 1192->1195 1204 7ab3b8b-7ab3b91 1193->1204 1205 7ab3b92-7ab3c18 1193->1205 1194->1188 1197 7ab3ac9-7ab3acc 1195->1197 1198 7ab3aa8-7ab3ab2 1195->1198 1197->1193 1199 7ab3ab6-7ab3ac5 1198->1199 1200 7ab3ab4 1198->1200 1199->1199 1202 7ab3ac7 1199->1202 1200->1199 1202->1197 1204->1205 1215 7ab3c1a-7ab3c1e 1205->1215 1216 7ab3c28-7ab3c2c 1205->1216 1215->1216 1217 7ab3c20 1215->1217 1218 7ab3c2e-7ab3c32 1216->1218 1219 7ab3c3c-7ab3c40 1216->1219 1217->1216 1218->1219 1222 7ab3c34 1218->1222 1220 7ab3c42-7ab3c46 1219->1220 1221 7ab3c50-7ab3c54 1219->1221 1220->1221 1223 7ab3c48 1220->1223 1224 7ab3c66-7ab3c6d 1221->1224 1225 7ab3c56-7ab3c5c 1221->1225 1222->1219 1223->1221 1226 7ab3c6f-7ab3c7e 1224->1226 1227 7ab3c84 1224->1227 1225->1224 1226->1227 1229 7ab3c85 1227->1229 1229->1229
                                          APIs
                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 07AB3B76
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 125df09ce718bce60d4cc4d778c8d4922673ccbfb10c69fcb6ca315366343998
                                          • Instruction ID: 5360b532724234f9c1eea8604ff78d30ad80d04d756d3ed15da07539e20a324d
                                          • Opcode Fuzzy Hash: 125df09ce718bce60d4cc4d778c8d4922673ccbfb10c69fcb6ca315366343998
                                          • Instruction Fuzzy Hash: E09179B1D0021ADFDF20CFA9C841BDDBBB6EB44310F1481A9E818A7251DB759985CF92
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00E1AFBE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730377363.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e10000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 69d9b66957ed293f6e82a4484e8820adbbdf48fa1afca118b523bad9497d8183
                                          • Instruction ID: fd3645c0559355497315c0ee9c6fc61f22a5cb24060d543d6cd487c0edd5a329
                                          • Opcode Fuzzy Hash: 69d9b66957ed293f6e82a4484e8820adbbdf48fa1afca118b523bad9497d8183
                                          • Instruction Fuzzy Hash: 29712370A01B058FD724DF2AD0507AABBF1FF88304F048929E08AE7A50DB75E885CB91
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00E159A9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730377363.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e10000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: e002c02e6d2613a17b82d02be4ad71c1d334ee8111c427ebb3128080a7486f7b
                                          • Instruction ID: 4883bed46a4a710c63304887db52e3ba86f66fa58f233f8304d643710c8bcf40
                                          • Opcode Fuzzy Hash: e002c02e6d2613a17b82d02be4ad71c1d334ee8111c427ebb3128080a7486f7b
                                          • Instruction Fuzzy Hash: BE41E2B1C00719CBDB24DFAAC884BDDBBB5BF88304F20806AD408BB255DB756985CF90
                                          APIs
                                          • CreateActCtxA.KERNEL32(?), ref: 00E159A9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730377363.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e10000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: Create
                                          • String ID:
                                          • API String ID: 2289755597-0
                                          • Opcode ID: 9d59f8cb3739d48257c8090f815739cb9dfbde2514d878881d52802244c1608a
                                          • Instruction ID: 80b804e310099f9a12bb1051aa833eb23a7cf2dcd4dd18637caa9af743b1827f
                                          • Opcode Fuzzy Hash: 9d59f8cb3739d48257c8090f815739cb9dfbde2514d878881d52802244c1608a
                                          • Instruction Fuzzy Hash: 3C41F2B1C00719CBDB14CFA9C8847DDBBB5BF88304F24815AD408BB295DB75698ACF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733598354.00000000072A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_72a0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: CreateFromIconResource
                                          • String ID:
                                          • API String ID: 3668623891-0
                                          • Opcode ID: b10c0c4cc1291a32c2ceafa3465d91efd4a99f843a2165c1f573968cd0751630
                                          • Instruction ID: 649177cd98d22c4ceaa74f786d3a0abe6b36153bee9e5cf4393e373a53a133af
                                          • Opcode Fuzzy Hash: b10c0c4cc1291a32c2ceafa3465d91efd4a99f843a2165c1f573968cd0751630
                                          • Instruction Fuzzy Hash: 253189B2904359AFDB11CFA9C804AEABFF8EF09310F14805AE954A7221C3359850CFA1
                                          APIs
                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07AB3748
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 0a098e5ab40f7de2f865d7d55f25aed4f41e3ccb936fa1bbaf10634c381fc548
                                          • Instruction ID: 40e8f916a3e447230827a5027a0b7a643a181d789884135d980fd0ff07734cba
                                          • Opcode Fuzzy Hash: 0a098e5ab40f7de2f865d7d55f25aed4f41e3ccb936fa1bbaf10634c381fc548
                                          • Instruction Fuzzy Hash: AC2137B59002599FCB10CFAAC885BEEBBF5FF48320F10842AE918A7251D7749944CFA4
                                          APIs
                                          • DrawTextExW.USER32(?,?,?,?,?,?), ref: 072A1F7F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733598354.00000000072A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_72a0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: DrawText
                                          • String ID:
                                          • API String ID: 2175133113-0
                                          • Opcode ID: 9c6497d2725c1c011a6f0f7b3de2afc445e255a14abf28f870c9e98fabdd8dec
                                          • Instruction ID: d216b515d6eef9dd7cbf9c5da6bbb9cd870ce9349b63d20dd4668cfadcbc123b
                                          • Opcode Fuzzy Hash: 9c6497d2725c1c011a6f0f7b3de2afc445e255a14abf28f870c9e98fabdd8dec
                                          • Instruction Fuzzy Hash: 4E3103B5D0034AAFDB10CF9AD884A9EFBF5FB48320F14842AE918A7310D774A554CFA0
                                          APIs
                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07AB3828
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: 579f7b4de9b7c4df62c0a062f19e3bd9ba6b12cdf011d90b9c13f0d274a67b8d
                                          • Instruction ID: ac98dbef84ee1f3333b73f2b122f7a6c83917bd25b02cce13a0935ab6afc26ff
                                          • Opcode Fuzzy Hash: 579f7b4de9b7c4df62c0a062f19e3bd9ba6b12cdf011d90b9c13f0d274a67b8d
                                          • Instruction Fuzzy Hash: BE2127B18002599FDF10CFAAD881AEEFBF5FF48320F50842AE518A7251D7759944CBA5
                                          APIs
                                          • DrawTextExW.USER32(?,?,?,?,?,?), ref: 072A1F7F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733598354.00000000072A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_72a0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: DrawText
                                          • String ID:
                                          • API String ID: 2175133113-0
                                          • Opcode ID: 07b97f372a6521aa5dda9d624f32683a0a21aa8715b4cbb6e2e0d440bccd78a3
                                          • Instruction ID: 13b8f997ccbfb2a2fb997c3b67bf914ae3d442c58150d77c88902b7ee07305c6
                                          • Opcode Fuzzy Hash: 07b97f372a6521aa5dda9d624f32683a0a21aa8715b4cbb6e2e0d440bccd78a3
                                          • Instruction Fuzzy Hash: 2621C3B5D1034A9FDB10CF9AD884A9EFBF5FB48320F14842AE919A7210D774A554CFA4
                                          APIs
                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 07AB3748
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: d59fe9b3c6fa05a9b5af517f4ca202749fc2de726f3b0b5453752edb57697ca8
                                          • Instruction ID: 0a6875c62652ba3cd17b3b10cb54eb9b13a17ca2885cd17998093e04362031d8
                                          • Opcode Fuzzy Hash: d59fe9b3c6fa05a9b5af517f4ca202749fc2de726f3b0b5453752edb57697ca8
                                          • Instruction Fuzzy Hash: 7B2146B19003599FCB10CFAAC880BDEBBF5FF48310F10842AE918A7251D7789944CFA4
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07AB3166
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 97665adaed7005c5f166f1a25ab0ccf2ea1fe0451b2dfafe37d402730a1812d2
                                          • Instruction ID: ebb16c2ff4732ff0dac296d44be18f9fa43068ec1537023eb539771975224468
                                          • Opcode Fuzzy Hash: 97665adaed7005c5f166f1a25ab0ccf2ea1fe0451b2dfafe37d402730a1812d2
                                          • Instruction Fuzzy Hash: 7D215CB19002099FDB10DFAAC4457EEBFF8EF89324F14842AD559A7241C7789584CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E1D6D7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730377363.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e10000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: dc6b97b6bae8bd63a35dfa1a9f6e0e68947211219d22433ac9c448eadd61fedb
                                          • Instruction ID: f6693738abbda20e081b2c8e96122f14295c24525adca0d755e63aa53df552d8
                                          • Opcode Fuzzy Hash: dc6b97b6bae8bd63a35dfa1a9f6e0e68947211219d22433ac9c448eadd61fedb
                                          • Instruction Fuzzy Hash: CA21E3B59002589FDB10CF9AD984ADEBBF9EB48314F14841AE958B7350D374A944CFA4
                                          APIs
                                          • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 07AB3828
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: MemoryProcessRead
                                          • String ID:
                                          • API String ID: 1726664587-0
                                          • Opcode ID: ca86dc94e026dff7486e6f266fc8e653add68cef8d78bf48f4141d60f00e618b
                                          • Instruction ID: abba0fc1f2a4dbc4d2199fb649038c5c8d1f072f8cb33567a13cacd792c97e25
                                          • Opcode Fuzzy Hash: ca86dc94e026dff7486e6f266fc8e653add68cef8d78bf48f4141d60f00e618b
                                          • Instruction Fuzzy Hash: 8D2128B18002599FCB10DFAAC880ADEFBF5FF48310F10842AE559A7250D7789544CBA5
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07AB3166
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 8eb3aba0fbb519cee1c608253eae135126d4cb1f6602079ab93717e0f8e39b76
                                          • Instruction ID: 4e36f8d42c72fa74e275e4b6e206766e70e4f383db687663a6c0e90bafa4f37a
                                          • Opcode Fuzzy Hash: 8eb3aba0fbb519cee1c608253eae135126d4cb1f6602079ab93717e0f8e39b76
                                          • Instruction Fuzzy Hash: 0D2129B1D003099FDB10DFAAC4857EEBBF8EF88324F14842AD559A7241D778A944CFA5
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E1D6D7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730377363.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e10000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: 7b018d2577eb8eeefa3afd2be4b159032fcd5761b6083504bd14e9ea08830919
                                          • Instruction ID: 88e8ec44e693911c00037a31dc12aaca31afd1848b458d687c6f588aa9827713
                                          • Opcode Fuzzy Hash: 7b018d2577eb8eeefa3afd2be4b159032fcd5761b6083504bd14e9ea08830919
                                          • Instruction Fuzzy Hash: DD21E2B59002489FDB10CFAAD984ADEBBF8FB48320F14841AE958A7350D374A944CFA4
                                          APIs
                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07AB3666
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 12d429c0de19932dc0a417aed606919e99d88d507b6160bcd874f7cc9592b3f9
                                          • Instruction ID: bc21b2d3dbb4698052a98f1845ec1c3032fc5c9587957835daa4ad69710b5e35
                                          • Opcode Fuzzy Hash: 12d429c0de19932dc0a417aed606919e99d88d507b6160bcd874f7cc9592b3f9
                                          • Instruction Fuzzy Hash: 6B216AB19002489FDF20DFAAD845BEFBFF9EF48320F108819E515A7251C7759540CBA5
                                          APIs
                                          • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,072AF12A,?,?,?,?,?), ref: 072AF1CF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733598354.00000000072A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_72a0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: CreateFromIconResource
                                          • String ID:
                                          • API String ID: 3668623891-0
                                          • Opcode ID: e425da8d7b22249f9d90f645c6cf1542d6e23bcb9f3d5e0d321e9b568c0bd53e
                                          • Instruction ID: 24426379eea87a1493c00fd8786e3d9494c82b6877abb8fec5cebbc701ea5346
                                          • Opcode Fuzzy Hash: e425da8d7b22249f9d90f645c6cf1542d6e23bcb9f3d5e0d321e9b568c0bd53e
                                          • Instruction Fuzzy Hash: EA116AB591034D9FDB10DF9AC944BDEBFF8EB48320F14841AE914A7210C379A950CFA4
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: f33121a6b727af091ff5ad7df6669046b90101c14f9cc9609fff0a7839f17117
                                          • Instruction ID: 8e1438cb0f9ee2ef1f320630d539204e8abe7228f49492fa3bc5c42e61ff41e2
                                          • Opcode Fuzzy Hash: f33121a6b727af091ff5ad7df6669046b90101c14f9cc9609fff0a7839f17117
                                          • Instruction Fuzzy Hash: 0D115BB19002488BCB20DFAAC4457DEFFF5EF88324F10841AD559A7654CB75A544CFA5
                                          APIs
                                          • OutputDebugStringW.KERNEL32(00000000), ref: 07379C88
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: DebugOutputString
                                          • String ID:
                                          • API String ID: 1166629820-0
                                          • Opcode ID: c7d582d0cc4866618b5517fadab83cb3e2f67730ee8ee10d6c53a8853ab6ea5c
                                          • Instruction ID: f3ad98f81fd800099aefe28a5b83e7aa9bf0dd2c8aa72c633196d8b5ca68db9b
                                          • Opcode Fuzzy Hash: c7d582d0cc4866618b5517fadab83cb3e2f67730ee8ee10d6c53a8853ab6ea5c
                                          • Instruction Fuzzy Hash: BB1130B1C0065A9BCB10CF9AD544BDEFBF4FB48320F10822AD818A7240C338A544CFA5
                                          APIs
                                          • OutputDebugStringW.KERNEL32(00000000), ref: 07379C88
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: DebugOutputString
                                          • String ID:
                                          • API String ID: 1166629820-0
                                          • Opcode ID: 607582a7e54da09a130d1e44ca8322683e249a769e40fde1f6c3341844c77180
                                          • Instruction ID: cb162137182525ca15ffa651f5c3a7310d7c72711d87b97279ca386baa449934
                                          • Opcode Fuzzy Hash: 607582a7e54da09a130d1e44ca8322683e249a769e40fde1f6c3341844c77180
                                          • Instruction Fuzzy Hash: 791112B1C0465A9BDB10CF9AD544B9EFBF8FB48320F14822AD918B7650D378A944CFA5
                                          APIs
                                          • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 07AB3666
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 6fe7e24801aebf128b0a33e1cced830d9e22d6e64e03301a41cc5acecb0b5adf
                                          • Instruction ID: 0d52759d52e7f075b449ae4016c4ffc64ba0b4fbbb03a4819ea2902113d0f0a5
                                          • Opcode Fuzzy Hash: 6fe7e24801aebf128b0a33e1cced830d9e22d6e64e03301a41cc5acecb0b5adf
                                          • Instruction Fuzzy Hash: C51137B19002499FCB20DFAAC844BDFBFF5EF88324F108819E559A7250C775A544CFA5
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 07AB6ECD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: fe884491bc6c4c51374ca37c9e93d92e09a71fc5d554d3d62ed9161f11fcd058
                                          • Instruction ID: 2d9337ee863f45e135b917577592e6fc512c22e8022e094abd714c254f409a90
                                          • Opcode Fuzzy Hash: fe884491bc6c4c51374ca37c9e93d92e09a71fc5d554d3d62ed9161f11fcd058
                                          • Instruction Fuzzy Hash: 2F1122B5800249DFCB20CF9AD884BDEBFF8EB48320F14881AE518A7601C375A584CFA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: c2ce338fb27401c7c54a539cd107221afb97d771cf3ca1b8005b72dc8d3e3f58
                                          • Instruction ID: 688023c50bede1ed1d4e7d3012775cf0d26d103af21f8071c515e6f389be2ec3
                                          • Opcode Fuzzy Hash: c2ce338fb27401c7c54a539cd107221afb97d771cf3ca1b8005b72dc8d3e3f58
                                          • Instruction Fuzzy Hash: 17113AB1D002498FDB20DFAAC4457DEFBF4EF88324F208819D559A7254C775A944CF95
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 00E1AFBE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730377363.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e10000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 05bbc1394c24109bed8436fa32280d549efaf298a9b72136c5831d0bea0570ea
                                          • Instruction ID: 401d7c23e14007476113fba7db4bbc55cccab7fda6778e58581d59434edb3426
                                          • Opcode Fuzzy Hash: 05bbc1394c24109bed8436fa32280d549efaf298a9b72136c5831d0bea0570ea
                                          • Instruction Fuzzy Hash: D41110B5D002498FCB10CF9AC444ADEFBF4AB88328F14842AD419B7614C379A585CFA1
                                          APIs
                                          • PostMessageW.USER32(?,00000010,00000000,?), ref: 07AB6ECD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: MessagePost
                                          • String ID:
                                          • API String ID: 410705778-0
                                          • Opcode ID: 8f655e251b254163da8044a605b93fdaef95c757d93e75301760c46947af37a6
                                          • Instruction ID: 7bd14c5e7e33a2b7707122850811cdd9564c00149bbd9772aa7d42f3aa295eed
                                          • Opcode Fuzzy Hash: 8f655e251b254163da8044a605b93fdaef95c757d93e75301760c46947af37a6
                                          • Instruction Fuzzy Hash: 1011F5B5800349DFDB20DF9AC444BEEBBF8EB48324F108459E558A7711C375A944CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730072125.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_dbd000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 60866a5b803803df9565b4a1092e7ea784bfb5efadfed93cd0ba620af2425400
                                          • Instruction ID: 4de994efc05e8f39cc61c01685b5e1c9fe5d79fc1606be445e3e964d46ec9599
                                          • Opcode Fuzzy Hash: 60866a5b803803df9565b4a1092e7ea784bfb5efadfed93cd0ba620af2425400
                                          • Instruction Fuzzy Hash: 01213A71500204DFDB05DF14D9C0B5ABF66FB94314F24C56DD90A4B256D336E856C7B2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730072125.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_dbd000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 81dd33d2efb11930258d3e2e0de82b58a238b47d8f98d7a701c0c0fa437340f8
                                          • Instruction ID: a242fb09b194a8beb6d3db92f49330b5d0bf4ce4c3191227a311a38689b50e1e
                                          • Opcode Fuzzy Hash: 81dd33d2efb11930258d3e2e0de82b58a238b47d8f98d7a701c0c0fa437340f8
                                          • Instruction Fuzzy Hash: 93213471504240DFCB25DF14D9C0B6BBFA6FB98318F24C569E84A0B256D336D856CBB2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730145721.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_dcd000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d5a103fbd9890d7a7c69b329d167829c2741cd77380ef42974a3972c0b5ed426
                                          • Instruction ID: 4e57dc3a6bb162649ea9fdafa383daaca819a6f3aaa911119e7b3aa96c84fcce
                                          • Opcode Fuzzy Hash: d5a103fbd9890d7a7c69b329d167829c2741cd77380ef42974a3972c0b5ed426
                                          • Instruction Fuzzy Hash: 5921D071604201DFCB14DF18D984F26BBA6EB84314F24C57DE84A4B296C33AD847DA71
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730145721.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_dcd000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f08f2fb76c7c20d4220d8ffc02ce156310c0e3f7a22882d709ee90fc4727cda
                                          • Instruction ID: db43dce5c88f35904a525989bf5fefd07e028d06f8124efd4467a35dce89d672
                                          • Opcode Fuzzy Hash: 6f08f2fb76c7c20d4220d8ffc02ce156310c0e3f7a22882d709ee90fc4727cda
                                          • Instruction Fuzzy Hash: 2F21D071504201EFDB05DF14D984F26FBA6FB84314F24C67DE8494B296C336D846CA75
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730145721.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_dcd000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ec66e7335d5070208ff6b7c9c4bbad07dfbdcc16b79ae40e8d4bcb3dac29cf8
                                          • Instruction ID: 49da2913797068686ddf83e50e73fda1a21debab811c517c94fc4c7c269cb315
                                          • Opcode Fuzzy Hash: 1ec66e7335d5070208ff6b7c9c4bbad07dfbdcc16b79ae40e8d4bcb3dac29cf8
                                          • Instruction Fuzzy Hash: 8C2183755093808FDB02CF24D994B15BF71EB46314F28C5EED8498F6A7C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730072125.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_dbd000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: 3e29c21f3f807216fd93b7ac971cfb3e14ef0f9148f5962a2d95dbb8483e38c5
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: 10112672404240CFCB02CF00D5C4B56BF72FB94324F28C6A9DC0A0B256C33AE85ACBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730072125.0000000000DBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DBD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_dbd000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction ID: b5062e443f3b06c4ae92693be57d894a856853d01e9dd2b632acb47c4eb2bcd6
                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                          • Instruction Fuzzy Hash: A311E676504280CFCB16CF14D5C4B56BFB2FB94318F28C6A9DC4A0B656C33AD85ACBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730145721.0000000000DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DCD000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_dcd000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction ID: 9b8a7f6f47364cb2ba0180311a5d7253fceb56be511b34089c8afa79bd757f3d
                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                          • Instruction Fuzzy Hash: D9118B76504280DFDB16CF14D9C4B15FBA2FB84314F28C6AED8494B696C33AD84ACB61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a14bc3b4f7e04ce22331b01006cce94453b941c037c4e7d1f8859660146ba872
                                          • Instruction ID: 9f51591c1e63d824f9be9735be3e2259dd266ad7f239bd6ae93109545fadcea4
                                          • Opcode Fuzzy Hash: a14bc3b4f7e04ce22331b01006cce94453b941c037c4e7d1f8859660146ba872
                                          • Instruction Fuzzy Hash: 64E1DEB0B017008FDB29EB69C550BEEB7FAAFC9700F14446AE0159B392DB35E941CB52
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 86ddcae8090988b543d05a01b9501d2a1239c2a845b85830772b3ee6b3770939
                                          • Instruction ID: d64dad5b3c39a1b23fcb745f29fac6a8e8e0d1d2fbe552c7aa984c502e81b4c4
                                          • Opcode Fuzzy Hash: 86ddcae8090988b543d05a01b9501d2a1239c2a845b85830772b3ee6b3770939
                                          • Instruction Fuzzy Hash: C0E11BB4E045198FDB24DFA9C5809AEFBB2FF49304F248169E818AB356D734AD41CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3005212156ab7d9bffee4737e10de14cbdd35513a148100a6f4ec9f79ca21d3
                                          • Instruction ID: d4bcfbae0de98c6269cef391bf5d571ff8bc2d90b2a4863d11bd2ce1019d693b
                                          • Opcode Fuzzy Hash: d3005212156ab7d9bffee4737e10de14cbdd35513a148100a6f4ec9f79ca21d3
                                          • Instruction Fuzzy Hash: 57E11CB4E005198FDB24DFA9C5849AEFBF2FF89304F248169D818AB356D734A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0063bd84060915c465d1d71547550174b3475f8aa6f6fc9ba6b13e4c3d20d795
                                          • Instruction ID: b6cfce9cb4d13a6ba588aad973cc38a739e9da6e6688f1f7dab5326af2244fb7
                                          • Opcode Fuzzy Hash: 0063bd84060915c465d1d71547550174b3475f8aa6f6fc9ba6b13e4c3d20d795
                                          • Instruction Fuzzy Hash: 55E12BB4E105198FDB24DFA9C5849AEFBF2FF89304F248169D818AB356D734A941CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a43cadb3bf7497372d74f7c407a045bf95e6111b697c5c86dbb740a94e448519
                                          • Instruction ID: 243a4bc3b776379f3fe38d0796106e9c369efc94e13610608b466b3248a2dcf0
                                          • Opcode Fuzzy Hash: a43cadb3bf7497372d74f7c407a045bf95e6111b697c5c86dbb740a94e448519
                                          • Instruction Fuzzy Hash: BEE12CB4E105198FDB24DFA9C5809AEFBB2FF89304F248169D418AB356D734A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: abe586f4e5ae3a26c87ddcdf4d2284746f935db65a42fa1303873a421eb9f6d6
                                          • Instruction ID: 7006eed1bbac39028680a7e73e9faacddb01f34c5f391653ee64014e5d6edf9f
                                          • Opcode Fuzzy Hash: abe586f4e5ae3a26c87ddcdf4d2284746f935db65a42fa1303873a421eb9f6d6
                                          • Instruction Fuzzy Hash: A1E1EAB4E042198FCB24DF99C5809AEFBF6FF89304F248169D815AB356DB31A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 43713f19ec978c071031cec57cbb654594a3830253cd5e8c3422b70042268816
                                          • Instruction ID: af6270e616c409c2f360ca502fea74c20b9ebdccb123b5346627c20c7426ef70
                                          • Opcode Fuzzy Hash: 43713f19ec978c071031cec57cbb654594a3830253cd5e8c3422b70042268816
                                          • Instruction Fuzzy Hash: 66E109B4E04219CFCB24DFA9C5909AEFBF6BF89304F248169D814AB356D731A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cb228fed8854f63fc1afe4d550fd595c26e0fd857b221f8bab5d6fa2212891b9
                                          • Instruction ID: 4903b68f9992cfc05f04598d20f007e128cefbed1c1c18751e25b4bc26e23049
                                          • Opcode Fuzzy Hash: cb228fed8854f63fc1afe4d550fd595c26e0fd857b221f8bab5d6fa2212891b9
                                          • Instruction Fuzzy Hash: 8CE1FAB4E002198FCB24DFA9C5809AEFBF6BF89304F24C169D815AB356D731A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 49e855086f2222acbd7bfcfcf70f10b8e52663610c7c4b5e6448cef473ee9408
                                          • Instruction ID: c14747f1be684de0bc2414cbe0d9239441b42310e63e3b7399afaeaff3d61691
                                          • Opcode Fuzzy Hash: 49e855086f2222acbd7bfcfcf70f10b8e52663610c7c4b5e6448cef473ee9408
                                          • Instruction Fuzzy Hash: 2BE10CB4E002198FCB14DFA9C5909AEFBF6FF89304F248159E815AB356D731A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8eec229906b618ffcf43761e03b75e8a099896d3a26f012e1e4ddd0f7f96077e
                                          • Instruction ID: d9b9f4b6d587cb14986052eef1a24465f33192de4d4fa87b7fa162b3147edbc6
                                          • Opcode Fuzzy Hash: 8eec229906b618ffcf43761e03b75e8a099896d3a26f012e1e4ddd0f7f96077e
                                          • Instruction Fuzzy Hash: DEE1ECB4E042198FCB24DFA9C580AAEFBF6FF89305F24855AD414AB356D730A941CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1730377363.0000000000E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_e10000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f0b5a4b94c1a4051547ec38a8602785299a8d13a64a18abb946f97d2470c317
                                          • Instruction ID: 67eed93a653465ffd2f494dcbaa6ad65190e11f355ad786ba2b27aab96aeefd5
                                          • Opcode Fuzzy Hash: 3f0b5a4b94c1a4051547ec38a8602785299a8d13a64a18abb946f97d2470c317
                                          • Instruction Fuzzy Hash: 9EA14A36E002058FCF05DFA5C8445DEB7B2FF89304B15957AE906BB266DB71E986CB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a42871a0a82d3e164010140561d34eb12f022267b87d40f960247ff1298b5cc
                                          • Instruction ID: 6c875ef18796ab81a1c839fd098a466fc2e3b1834fc29d73d09d84275516aeeb
                                          • Opcode Fuzzy Hash: 8a42871a0a82d3e164010140561d34eb12f022267b87d40f960247ff1298b5cc
                                          • Instruction Fuzzy Hash: 4C7171B4E016188FDB14DFAAD58499EFBF2FF88300F14D16AE419AB215DB349942CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d287023bb277c79c10f79aa9f38916ef08e575a7a8ec216cd745b1e2aa1c3384
                                          • Instruction ID: d64bcadea02d938394519aa3a2fb7388d7602819d7316f57d12edcd91d488435
                                          • Opcode Fuzzy Hash: d287023bb277c79c10f79aa9f38916ef08e575a7a8ec216cd745b1e2aa1c3384
                                          • Instruction Fuzzy Hash: 7B5183B1D012199FDB18DFEAD8446DEBBB6FF89300F10C029E519AB254D7345906CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1734276306.0000000007AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AB0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7ab0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5b898d85f90d5ce9adcb59f8d35dc4e4608c0aabf64fa369afb566fe5bf1f80d
                                          • Instruction ID: bf1e25036e6b1d978646e75d25b9835d1824303597003ccf3d3efc468e6c9fdf
                                          • Opcode Fuzzy Hash: 5b898d85f90d5ce9adcb59f8d35dc4e4608c0aabf64fa369afb566fe5bf1f80d
                                          • Instruction Fuzzy Hash: EF512EB0E052198FCB14CFA9C5805EEFBF6EF89304F24C169D418AB216DB319A41CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3dc054e427b2336aaeca004a28ee47505de9dff28e1ff67e78e27a794e551068
                                          • Instruction ID: f5ed49e7b07f9324acb5df3f47667d8b9638040a613fb5eeec960067e6351baf
                                          • Opcode Fuzzy Hash: 3dc054e427b2336aaeca004a28ee47505de9dff28e1ff67e78e27a794e551068
                                          • Instruction Fuzzy Hash: 3151B4B5E002599FEB18CFEAD88469EFBF6EF88300F24C12AE519AB254D7345945CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.1733665803.0000000007370000.00000040.00000800.00020000.00000000.sdmp, Offset: 07370000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_7370000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ecba954aa09e01a2b6a7531475e91cb4a95370351ed2f163782d220e6cb71a50
                                          • Instruction ID: c218175b148d4e9eeeee3c9088af73ea7cb105e05bda3086e7ba0cb4314b1339
                                          • Opcode Fuzzy Hash: ecba954aa09e01a2b6a7531475e91cb4a95370351ed2f163782d220e6cb71a50
                                          • Instruction Fuzzy Hash: 02517FB5E006598FDB08DFAAD98469EFBF2BF88300F14C16AD419AB354DB349946CB50

                                          Execution Graph

                                          Execution Coverage:16.1%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:27.1%
                                          Total number of Nodes:48
                                          Total number of Limit Nodes:3
                                          execution_graph 17289 16b46d8 17290 16b46e4 17289->17290 17293 16b48c9 17290->17293 17291 16b4713 17294 16b48e4 17293->17294 17301 16b4f08 17294->17301 17307 16b4ef8 17294->17307 17295 16b48f0 17313 32d15f8 17295->17313 17319 32d15eb 17295->17319 17296 16b491a 17296->17291 17302 16b4f2a 17301->17302 17303 16b4ff6 17302->17303 17325 16bc168 17302->17325 17329 16bc76c 17302->17329 17335 16bc158 17302->17335 17303->17295 17308 16b4f2a 17307->17308 17309 16b4ff6 17308->17309 17310 16bc168 LdrInitializeThunk 17308->17310 17311 16bc158 2 API calls 17308->17311 17312 16bc76c 2 API calls 17308->17312 17309->17295 17310->17309 17311->17309 17312->17309 17314 32d161a 17313->17314 17315 32d172c 17314->17315 17316 16bc168 LdrInitializeThunk 17314->17316 17317 16bc158 2 API calls 17314->17317 17318 16bc76c 2 API calls 17314->17318 17315->17296 17316->17315 17317->17315 17318->17315 17320 32d161a 17319->17320 17321 32d172c 17320->17321 17322 16bc168 LdrInitializeThunk 17320->17322 17323 16bc158 2 API calls 17320->17323 17324 16bc76c 2 API calls 17320->17324 17321->17296 17322->17321 17323->17321 17324->17321 17326 16bc17a 17325->17326 17328 16bc17f 17325->17328 17326->17303 17327 16bc8a9 LdrInitializeThunk 17327->17326 17328->17326 17328->17327 17330 16bc623 17329->17330 17332 16bc764 LdrInitializeThunk 17330->17332 17334 16bc168 LdrInitializeThunk 17330->17334 17333 16bc8c1 17332->17333 17333->17303 17334->17330 17336 16bc17a 17335->17336 17340 16bc17f 17335->17340 17336->17303 17337 16bc764 LdrInitializeThunk 17337->17336 17339 16bc168 LdrInitializeThunk 17339->17340 17340->17336 17340->17337 17340->17339 17341 16bcab0 17342 16bcadd 17341->17342 17343 16bc168 LdrInitializeThunk 17342->17343 17344 16be9bf 17342->17344 17346 16bcde6 17342->17346 17343->17346 17345 16bc168 LdrInitializeThunk 17345->17346 17346->17344 17346->17345
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                          • API String ID: 0-2735749406
                                          • Opcode ID: 4c3335b0e7ce9368b8285dab9cba3151b297545933cd10563eb548b75f0321ad
                                          • Instruction ID: 132995b0047885cb52a34833a66eeacae65af812dc9ac5dd89f22494ac8f7c10
                                          • Opcode Fuzzy Hash: 4c3335b0e7ce9368b8285dab9cba3151b297545933cd10563eb548b75f0321ad
                                          • Instruction Fuzzy Hash: 7A825C30A1064ADFCB14CF68D988AAEBBF6FF48314F198599E4059B3A5D734ED81CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (o^q$(o^q$(o^q$(o^q$,bq$,bq$Hbq
                                          • API String ID: 0-1608600535
                                          • Opcode ID: f80b3817c24f330d39f1453fbb8fa8aa4ffa90c2c4635eee5f1ffc41fb526b99
                                          • Instruction ID: fb5aa43368c4490fa70fb02e3ed0f3762ffa2824acfdcfea1d828de6e6dcb5e2
                                          • Opcode Fuzzy Hash: f80b3817c24f330d39f1453fbb8fa8aa4ffa90c2c4635eee5f1ffc41fb526b99
                                          • Instruction Fuzzy Hash: 75928270A102199FCB15DF69D844AAEBBF6FF88300F198569E845DB3A5DB34DC81CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2389 32d1c58-32d1c80 2390 32d1c87-32d1d2b 2389->2390 2391 32d1c82 2389->2391 2395 32d1d2d-32d1d34 2390->2395 2396 32d1d39-32d1d8a 2390->2396 2391->2390 2397 32d1f94-32d1fb2 2395->2397 2404 32d1e5c 2396->2404 2405 32d1e65-32d1e73 2404->2405 2406 32d1d8f-32d1dbc 2405->2406 2407 32d1e79-32d1e9e 2405->2407 2414 32d1ddd 2406->2414 2415 32d1dbe-32d1dc7 2406->2415 2411 32d1eb6 2407->2411 2412 32d1ea0-32d1eb5 2407->2412 2411->2397 2412->2411 2419 32d1de0-32d1e01 2414->2419 2417 32d1dce-32d1dd1 2415->2417 2418 32d1dc9-32d1dcc 2415->2418 2420 32d1ddb 2417->2420 2418->2420 2423 32d1e5a-32d1e5b 2419->2423 2424 32d1e03-32d1e59 2419->2424 2420->2419 2423->2404 2424->2423
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PH^q$PH^q
                                          • API String ID: 0-1598597984
                                          • Opcode ID: 42970943dfafc1516b3263605e426d81ac33b74cbf82d53c0ff67b42553c5b2b
                                          • Instruction ID: 313be32c54b488ac0d4c3d242b3211e528e0235c01bc9cae31b66e4cb4c2117d
                                          • Opcode Fuzzy Hash: 42970943dfafc1516b3263605e426d81ac33b74cbf82d53c0ff67b42553c5b2b
                                          • Instruction Fuzzy Hash: E981D074E00218CFDB58DFAAD9947ADBBF2BF89300F24806AD419AB354DB746985CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2520 16bc168-16bc178 2521 16bc17a 2520->2521 2522 16bc17f-16bc18b 2520->2522 2523 16bc2ab-16bc2b5 2521->2523 2525 16bc18d 2522->2525 2526 16bc192-16bc1a7 2522->2526 2525->2523 2529 16bc2bb-16bc2fb call 16b5d08 2526->2529 2530 16bc1ad-16bc1b8 2526->2530 2547 16bc302-16bc378 call 16b5d08 call 16b5c00 2529->2547 2533 16bc1be-16bc1c5 2530->2533 2534 16bc2b6 2530->2534 2536 16bc1f2-16bc1fd 2533->2536 2537 16bc1c7-16bc1de 2533->2537 2534->2529 2541 16bc20a-16bc214 2536->2541 2542 16bc1ff-16bc207 2536->2542 2537->2547 2548 16bc1e4-16bc1e7 2537->2548 2550 16bc21a-16bc224 2541->2550 2551 16bc29e-16bc2a3 2541->2551 2542->2541 2581 16bc37a-16bc3b7 2547->2581 2582 16bc3df-16bc454 call 16b5ca8 2547->2582 2548->2534 2553 16bc1ed-16bc1f0 2548->2553 2550->2534 2558 16bc22a-16bc246 2550->2558 2551->2523 2553->2536 2553->2537 2563 16bc24a-16bc24d 2558->2563 2564 16bc248 2558->2564 2566 16bc24f-16bc252 2563->2566 2567 16bc254-16bc257 2563->2567 2564->2523 2569 16bc25a-16bc268 2566->2569 2567->2569 2569->2534 2573 16bc26a-16bc271 2569->2573 2573->2523 2575 16bc273-16bc279 2573->2575 2575->2534 2576 16bc27b-16bc280 2575->2576 2576->2534 2578 16bc282-16bc295 2576->2578 2578->2534 2586 16bc297-16bc29a 2578->2586 2583 16bc3b9 2581->2583 2584 16bc3be-16bc3dc 2581->2584 2589 16bc4f3-16bc4f9 2582->2589 2583->2584 2584->2582 2586->2575 2588 16bc29c 2586->2588 2588->2523 2590 16bc459-16bc46c 2589->2590 2591 16bc4ff-16bc517 2589->2591 2592 16bc46e 2590->2592 2593 16bc473-16bc4c4 2590->2593 2594 16bc52b-16bc53e 2591->2594 2595 16bc519-16bc526 2591->2595 2592->2593 2612 16bc4d7-16bc4e9 2593->2612 2613 16bc4c6-16bc4d4 2593->2613 2597 16bc540 2594->2597 2598 16bc545-16bc561 2594->2598 2596 16bc8c1-16bc9bf 2595->2596 2603 16bc9c1-16bc9c6 call 16b5ca8 2596->2603 2604 16bc9c7-16bc9d1 2596->2604 2597->2598 2600 16bc568-16bc58c 2598->2600 2601 16bc563 2598->2601 2608 16bc58e 2600->2608 2609 16bc593-16bc5c5 2600->2609 2601->2600 2603->2604 2608->2609 2618 16bc5cc-16bc60e 2609->2618 2619 16bc5c7 2609->2619 2615 16bc4eb 2612->2615 2616 16bc4f0 2612->2616 2613->2591 2615->2616 2616->2589 2621 16bc610 2618->2621 2622 16bc615-16bc61e 2618->2622 2619->2618 2621->2622 2623 16bc846-16bc84c 2622->2623 2624 16bc623-16bc648 2623->2624 2625 16bc852-16bc865 2623->2625 2626 16bc64a 2624->2626 2627 16bc64f-16bc686 2624->2627 2628 16bc86c-16bc887 2625->2628 2629 16bc867 2625->2629 2626->2627 2637 16bc688 2627->2637 2638 16bc68d-16bc6bf 2627->2638 2630 16bc889 2628->2630 2631 16bc88e-16bc8a2 2628->2631 2629->2628 2630->2631 2635 16bc8a9-16bc8bf LdrInitializeThunk 2631->2635 2636 16bc8a4 2631->2636 2635->2596 2636->2635 2637->2638 2640 16bc723-16bc736 2638->2640 2641 16bc6c1-16bc6e6 2638->2641 2642 16bc738 2640->2642 2643 16bc73d-16bc762 2640->2643 2644 16bc6e8 2641->2644 2645 16bc6ed-16bc71b 2641->2645 2642->2643 2648 16bc771-16bc7a9 2643->2648 2649 16bc764-16bc765 2643->2649 2644->2645 2645->2640 2650 16bc7ab 2648->2650 2651 16bc7b0-16bc811 call 16bc168 2648->2651 2649->2625 2650->2651 2657 16bc818-16bc83c 2651->2657 2658 16bc813 2651->2658 2661 16bc83e 2657->2661 2662 16bc843 2657->2662 2658->2657 2661->2662 2662->2623
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2929385309.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_16b0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5bcca47dd1a03c3b4a980ce13f38081b763889cb309c3edd09593b7f58c752a4
                                          • Instruction ID: 651a06ff6861d0a55cea1abefe7bd1e579e38162914395619574f918bcda8b62
                                          • Opcode Fuzzy Hash: 5bcca47dd1a03c3b4a980ce13f38081b763889cb309c3edd09593b7f58c752a4
                                          • Instruction Fuzzy Hash: 32224874E01219CFDB14DFA9D884BDDBBB2BF88300F1485A9E409AB355DB359A86CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7277b311f4ea97529bb7f53d179c69e2a6f72403ba6b900adc3e01c648b7c34f
                                          • Instruction ID: 72f11c1c8e6571187d66938da1c37095b0f54014fdb94b98b28f9cf252d2b1e7
                                          • Opcode Fuzzy Hash: 7277b311f4ea97529bb7f53d179c69e2a6f72403ba6b900adc3e01c648b7c34f
                                          • Instruction Fuzzy Hash: 4B828B74E012298FDB64DF69DD98BDDBBB2BB89300F1481EA940DA7264DB315E85CF40
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 73488a9fc01ae4af41fccf0f3022915fb3775cdbec9cbebcbc533a4d0959dc09
                                          • Instruction ID: a2ef6d99a4db191847bb3e0cc981658561d31f9432422ae20afee4a7e1485651
                                          • Opcode Fuzzy Hash: 73488a9fc01ae4af41fccf0f3022915fb3775cdbec9cbebcbc533a4d0959dc09
                                          • Instruction Fuzzy Hash: 85E1CF74E01218CFEB64CFA9D984BDDBBB2BF89300F6080A9D409A7394DB755A85CF15
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f9c581046eb9ae8867208bd69e2d44fd1054de792fa9bf202ba2bc831afcf72d
                                          • Instruction ID: 4003af930baa01f10e14c711f96038b70e6e29ef031114fe3f09ff53d61cf21a
                                          • Opcode Fuzzy Hash: f9c581046eb9ae8867208bd69e2d44fd1054de792fa9bf202ba2bc831afcf72d
                                          • Instruction Fuzzy Hash: 95C19F74E01218CFDB14DFA9D984B9DBBB2EF89300F6080A9D409AB364DB359E85CF55
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2929385309.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_16b0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4aabfb6d92984dce0e0ef5affed0d6c4140e44735614fbb9ca2d302695110c74
                                          • Instruction ID: 5d55311f8bed9187ec5ce096f4ecdf060e1e9d1d6e4093982a3812af10b42b03
                                          • Opcode Fuzzy Hash: 4aabfb6d92984dce0e0ef5affed0d6c4140e44735614fbb9ca2d302695110c74
                                          • Instruction Fuzzy Hash: 05C19E74E01218CFDB14DFA9D998B9DBBB2FB89300F2090A9D809A7354DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2929385309.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_16b0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e968837bc198ce3f3c7aa1a768542325e24f6d508f4d644a29f4f7766b7f0746
                                          • Instruction ID: a7f8df0a948bf4bdf5576cf67c7c7cfeadba572ca5c704ddffb6ef5121531e6f
                                          • Opcode Fuzzy Hash: e968837bc198ce3f3c7aa1a768542325e24f6d508f4d644a29f4f7766b7f0746
                                          • Instruction Fuzzy Hash: 26A10470E01208CFEB24DFA9D984BDDBBB1BF88300F209269E509A7395DB745985CF55
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2929385309.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_16b0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d90360036da83019f22031fb4115683e3c4114c2014f30b3a7f3b2fe69bad3d8
                                          • Instruction ID: c3048318a165e5d5586456a901d4d924040d5f8d77cfcb393b7c53aced71fb24
                                          • Opcode Fuzzy Hash: d90360036da83019f22031fb4115683e3c4114c2014f30b3a7f3b2fe69bad3d8
                                          • Instruction Fuzzy Hash: AB91F370E01218CFDB10DFA8D988BDCBBB1FF49301F249269E509A7291DB749985CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 79a9ed5caa0ad5c1901c66ebeaa26d08aff325c4f12f1a355c170dbff95ae9ee
                                          • Instruction ID: 41038c60ef488b7ee3b1e796895560688fa777e17d4f60465407cae6351b7f37
                                          • Opcode Fuzzy Hash: 79a9ed5caa0ad5c1901c66ebeaa26d08aff325c4f12f1a355c170dbff95ae9ee
                                          • Instruction Fuzzy Hash: 7941C3B0D012098BEB58DFAAD8447DDFBF2BF89300F14D069C418AB294DB755986CF24
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7cf6628dd82bd58555fa66e42c0ad94b8a5d05728ce78239c447ca9e358568bc
                                          • Instruction ID: dc50c355fcc9c117f5487ab3bbfcd87363b51e4d8948456324348ebf584ddf4c
                                          • Opcode Fuzzy Hash: 7cf6628dd82bd58555fa66e42c0ad94b8a5d05728ce78239c447ca9e358568bc
                                          • Instruction Fuzzy Hash: 9141D370E01209DBEB18CFAAD9446DEFBF2AF89300F24D12AC419BB254DB345946CF54

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1842 32d8848-32d8d36 1917 32d8d3c-32d8d4c 1842->1917 1918 32d9288-32d92a8 1842->1918 1917->1918 1919 32d8d52-32d8d62 1917->1919 1923 32d92f9-32d9301 1918->1923 1924 32d92aa-32d92bd 1918->1924 1919->1918 1920 32d8d68-32d8d78 1919->1920 1920->1918 1922 32d8d7e-32d8d8e 1920->1922 1922->1918 1925 32d8d94-32d8da4 1922->1925 1933 32d9326-32d9329 1923->1933 1934 32d9303-32d930e 1923->1934 1926 32d92bf-32d92c4 1924->1926 1927 32d92c9-32d92e7 1924->1927 1925->1918 1928 32d8daa-32d8dba 1925->1928 1930 32d93ae-32d93b3 1926->1930 1952 32d935e-32d936a 1927->1952 1953 32d92e9-32d92f3 1927->1953 1928->1918 1932 32d8dc0-32d8dd0 1928->1932 1932->1918 1937 32d8dd6-32d8de6 1932->1937 1935 32d932b-32d9337 1933->1935 1936 32d9340-32d934c 1933->1936 1934->1933 1946 32d9310-32d931a 1934->1946 1935->1936 1948 32d9339-32d933e 1935->1948 1940 32d934e-32d9355 1936->1940 1941 32d93b4-32d9410 1936->1941 1937->1918 1939 32d8dec-32d8dfc 1937->1939 1939->1918 1944 32d8e02-32d8e12 1939->1944 1940->1941 1945 32d9357-32d935c 1940->1945 1964 32d9423-32d942e 1941->1964 1965 32d9412-32d941d 1941->1965 1944->1918 1949 32d8e18-32d9287 1944->1949 1945->1930 1946->1933 1955 32d931c-32d9321 1946->1955 1948->1930 1962 32d936c-32d9378 1952->1962 1963 32d9381-32d938d 1952->1963 1953->1952 1960 32d92f5-32d92f7 1953->1960 1955->1930 1960->1923 1962->1963 1969 32d937a-32d937f 1962->1969 1971 32d938f-32d939b 1963->1971 1972 32d93a4-32d93a6 1963->1972 1976 32d94ff-32d952b 1964->1976 1977 32d9434-32d9491 1964->1977 1965->1964 1975 32d94a6-32d94f8 1965->1975 1969->1930 1971->1972 1982 32d939d-32d93a2 1971->1982 1972->1930 1975->1976 1988 32d949a-32d94a3 1977->1988 1982->1930
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $^q$$^q
                                          • API String ID: 0-355816377
                                          • Opcode ID: 180823f24952e87f8066b1777a6b92e0e994c026f2b409269af3912e38c076f7
                                          • Instruction ID: 951746d0e594f953475c48510b4b147237a45f1ace2ca1af914f54e40cc2155d
                                          • Opcode Fuzzy Hash: 180823f24952e87f8066b1777a6b92e0e994c026f2b409269af3912e38c076f7
                                          • Instruction Fuzzy Hash: 57625C34A102198FDB25DBA4C864B9EBBB7FF84300F1481ADD10AAB3A5CF359D85DB51

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2135 32d65f1-32d660d 2136 32d660f-32d6613 2135->2136 2137 32d6615-32d6617 2135->2137 2136->2137 2138 32d661c-32d6627 2136->2138 2139 32d6828-32d682f 2137->2139 2140 32d662d-32d6634 2138->2140 2141 32d6830 2138->2141 2142 32d67c9-32d67cf 2140->2142 2143 32d663a-32d6649 2140->2143 2145 32d6835-32d686d 2141->2145 2146 32d67d5-32d67d9 2142->2146 2147 32d67d1-32d67d3 2142->2147 2144 32d664f-32d665e 2143->2144 2143->2145 2153 32d6660-32d6663 2144->2153 2154 32d6673-32d6676 2144->2154 2165 32d686f-32d6874 2145->2165 2166 32d6876-32d687a 2145->2166 2148 32d67db-32d67e1 2146->2148 2149 32d6826 2146->2149 2147->2139 2148->2141 2151 32d67e3-32d67e6 2148->2151 2149->2139 2151->2141 2155 32d67e8-32d67fd 2151->2155 2156 32d6665-32d6668 2153->2156 2157 32d6682-32d6688 2153->2157 2154->2157 2158 32d6678-32d667b 2154->2158 2177 32d67ff-32d6805 2155->2177 2178 32d6821-32d6824 2155->2178 2160 32d666e 2156->2160 2161 32d6769-32d676f 2156->2161 2167 32d668a-32d6690 2157->2167 2168 32d66a0-32d66bd 2157->2168 2162 32d667d 2158->2162 2163 32d66ce-32d66d4 2158->2163 2174 32d6794-32d67a1 2160->2174 2172 32d6787-32d6791 2161->2172 2173 32d6771-32d6777 2161->2173 2162->2174 2175 32d66ec-32d66fe 2163->2175 2176 32d66d6-32d66dc 2163->2176 2171 32d6880-32d6882 2165->2171 2166->2171 2169 32d6694-32d669e 2167->2169 2170 32d6692 2167->2170 2208 32d66c6-32d66c9 2168->2208 2169->2168 2170->2168 2179 32d6884-32d6896 2171->2179 2180 32d6897-32d689e 2171->2180 2172->2174 2181 32d6779 2173->2181 2182 32d677b-32d6785 2173->2182 2194 32d67b5-32d67b7 2174->2194 2195 32d67a3-32d67a7 2174->2195 2198 32d670e-32d6731 2175->2198 2199 32d6700-32d670c 2175->2199 2184 32d66de 2176->2184 2185 32d66e0-32d66ea 2176->2185 2186 32d6817-32d681a 2177->2186 2187 32d6807-32d6815 2177->2187 2178->2139 2181->2172 2182->2172 2184->2175 2185->2175 2186->2141 2190 32d681c-32d681f 2186->2190 2187->2141 2187->2186 2190->2177 2190->2178 2203 32d67bb-32d67be 2194->2203 2195->2194 2202 32d67a9-32d67ad 2195->2202 2198->2141 2211 32d6737-32d673a 2198->2211 2209 32d6759-32d6767 2199->2209 2202->2141 2204 32d67b3 2202->2204 2203->2141 2205 32d67c0-32d67c3 2203->2205 2204->2203 2205->2142 2205->2143 2208->2174 2209->2174 2211->2141 2213 32d6740-32d6752 2211->2213 2213->2209
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,bq$,bq
                                          • API String ID: 0-2699258169
                                          • Opcode ID: cdd5f5c53595ae172f6b754ab7c76ef9fdcf7af78274b529a396f2410020fa70
                                          • Instruction ID: 8a90e9d7c373481a3d621f87ee532da433b0d39aa1a58f720bcf7f66f24c5a75
                                          • Opcode Fuzzy Hash: cdd5f5c53595ae172f6b754ab7c76ef9fdcf7af78274b529a396f2410020fa70
                                          • Instruction Fuzzy Hash: 3681B434B2010ACFDB14CF69D884A6AF7B6FF88204B998169D405DB3A5DB31EC85CF90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2215 32d2508-32d2527 2216 32d252d-32d2536 2215->2216 2217 32d26e2-32d2707 2215->2217 2221 32d253c-32d2591 2216->2221 2222 32d270e-32d27a8 call 32d2270 2216->2222 2217->2222 2230 32d25bb-32d25c4 2221->2230 2231 32d2593-32d25b8 2221->2231 2263 32d27ad-32d27b2 2222->2263 2233 32d25c9-32d25d9 2230->2233 2234 32d25c6 2230->2234 2231->2230 2271 32d25db call 32d2508 2233->2271 2272 32d25db call 32d24f8 2233->2272 2273 32d25db call 32d26ea 2233->2273 2234->2233 2237 32d25e1-32d25e3 2239 32d263d-32d268a 2237->2239 2240 32d25e5-32d25ea 2237->2240 2252 32d2691-32d2696 2239->2252 2242 32d25ec-32d2621 2240->2242 2243 32d2623-32d2636 2240->2243 2242->2252 2243->2239 2255 32d2698 2252->2255 2256 32d26a0-32d26a5 2252->2256 2255->2256 2259 32d26af-32d26b4 2256->2259 2260 32d26a7 2256->2260 2261 32d26c9 2259->2261 2262 32d26b6-32d26c4 call 32d20e4 call 32d20fc 2259->2262 2260->2259 2261->2217 2262->2261 2271->2237 2272->2237 2273->2237
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (&^q$(bq
                                          • API String ID: 0-1294341849
                                          • Opcode ID: 5532e8a45cda144d25f8e8a501848269831aa99b33abceb934627efd24096671
                                          • Instruction ID: 3728c8cbb4ba20941f27efc0b63be2354aae79549f6f9c38cb0fddb7db086aba
                                          • Opcode Fuzzy Hash: 5532e8a45cda144d25f8e8a501848269831aa99b33abceb934627efd24096671
                                          • Instruction Fuzzy Hash: 08716F31F103599BDB15DFB9D8506AEBBB2BF84700F148529D406AB384DF30AD46CB95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2274 32d6130-32d6162 2275 32d6178-32d6183 2274->2275 2276 32d6164-32d6168 2274->2276 2279 32d6189-32d618b 2275->2279 2280 32d622b-32d6257 2275->2280 2277 32d616a-32d6176 2276->2277 2278 32d6190-32d6197 2276->2278 2277->2275 2277->2278 2282 32d6199-32d61a0 2278->2282 2283 32d61b7-32d61c0 2278->2283 2281 32d6223-32d6228 2279->2281 2286 32d625e-32d62b6 2280->2286 2282->2283 2284 32d61a2-32d61ad 2282->2284 2384 32d61c2 call 32d62a8 2283->2384 2385 32d61c2 call 32d6130 2283->2385 2284->2286 2287 32d61b3-32d61b5 2284->2287 2308 32d62b8-32d62be 2286->2308 2309 32d62c5-32d62d6 call 32d2a50 2286->2309 2287->2281 2288 32d61c8-32d61ca 2290 32d61cc-32d61d0 2288->2290 2291 32d61d2-32d61da 2288->2291 2290->2291 2292 32d61ed-32d61fe 2290->2292 2293 32d61dc-32d61e1 2291->2293 2294 32d61e9-32d61eb 2291->2294 2387 32d6201 call 32d6988 2292->2387 2388 32d6201 call 32d6998 2292->2388 2293->2294 2294->2281 2297 32d6207-32d620c 2300 32d620e-32d6217 2297->2300 2301 32d6221 2297->2301 2379 32d6219 call 32d947d 2300->2379 2380 32d6219 call 32d8838 2300->2380 2381 32d6219 call 32d8848 2300->2381 2301->2281 2303 32d621f 2303->2281 2308->2309 2312 32d62dc-32d62e0 2309->2312 2313 32d636a-32d636c 2309->2313 2314 32d62f0-32d62fd 2312->2314 2315 32d62e2-32d62ee 2312->2315 2382 32d636e call 32d62a8 2313->2382 2383 32d636e call 32d6130 2313->2383 2321 32d62ff-32d6309 2314->2321 2315->2321 2316 32d6374-32d637a 2318 32d637c-32d6382 2316->2318 2319 32d6386-32d638d 2316->2319 2322 32d63e8-32d6447 2318->2322 2323 32d6384 2318->2323 2326 32d630b-32d631a 2321->2326 2327 32d6336-32d633a 2321->2327 2335 32d644e-32d647e 2322->2335 2323->2319 2338 32d631c-32d6323 2326->2338 2339 32d632a-32d6334 2326->2339 2329 32d633c-32d6342 2327->2329 2330 32d6346-32d634a 2327->2330 2333 32d6344 2329->2333 2334 32d6390-32d63e1 2329->2334 2330->2319 2331 32d634c-32d6350 2330->2331 2331->2335 2336 32d6356-32d6368 2331->2336 2333->2319 2334->2322 2350 32d6480-32d648d 2335->2350 2351 32d64a3-32d64b0 2335->2351 2336->2319 2338->2339 2339->2327 2356 32d649f-32d64a1 2350->2356 2357 32d648f-32d649d 2350->2357 2359 32d64b2-32d64bc 2351->2359 2356->2359 2357->2359 2364 32d64be-32d64cc 2359->2364 2365 32d64e4-32d64e6 call 32d65f1 2359->2365 2370 32d64ce-32d64d2 2364->2370 2371 32d64d9-32d64e2 2364->2371 2368 32d64ec-32d64f0 2365->2368 2372 32d6509-32d650d 2368->2372 2373 32d64f2-32d6507 2368->2373 2370->2371 2371->2365 2374 32d650f-32d6524 2372->2374 2375 32d652b-32d6531 2372->2375 2373->2375 2374->2375 2379->2303 2380->2303 2381->2303 2382->2316 2383->2316 2384->2288 2385->2288 2387->2297 2388->2297
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Hbq$Hbq
                                          • API String ID: 0-4258043069
                                          • Opcode ID: 76962a4ebb2ee3703d94e582a812d82459d711d7d0b040d2c7888389b9736fc2
                                          • Instruction ID: 3c6c9683ff23aab2f9c40810c362bfb872aed65122d41a91ec86aac3024dd7d4
                                          • Opcode Fuzzy Hash: 76962a4ebb2ee3703d94e582a812d82459d711d7d0b040d2c7888389b9736fc2
                                          • Instruction Fuzzy Hash: D851F0317142568FCB15DF64D858BAABBF6FF89300F488969E8458B381DB78D851CB90

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2663 16bc76c 2664 16bc82b-16bc83c 2663->2664 2665 16bc83e 2664->2665 2666 16bc843-16bc84c 2664->2666 2665->2666 2668 16bc623-16bc648 2666->2668 2669 16bc852-16bc865 2666->2669 2670 16bc64a 2668->2670 2671 16bc64f-16bc686 2668->2671 2672 16bc86c-16bc887 2669->2672 2673 16bc867 2669->2673 2670->2671 2681 16bc688 2671->2681 2682 16bc68d-16bc6bf 2671->2682 2674 16bc889 2672->2674 2675 16bc88e-16bc8a2 2672->2675 2673->2672 2674->2675 2679 16bc8a9-16bc8bf LdrInitializeThunk 2675->2679 2680 16bc8a4 2675->2680 2683 16bc8c1-16bc9bf 2679->2683 2680->2679 2681->2682 2689 16bc723-16bc736 2682->2689 2690 16bc6c1-16bc6e6 2682->2690 2686 16bc9c1-16bc9c6 call 16b5ca8 2683->2686 2687 16bc9c7-16bc9d1 2683->2687 2686->2687 2692 16bc738 2689->2692 2693 16bc73d-16bc762 2689->2693 2694 16bc6e8 2690->2694 2695 16bc6ed-16bc71b 2690->2695 2692->2693 2698 16bc771-16bc7a9 2693->2698 2699 16bc764-16bc765 2693->2699 2694->2695 2695->2689 2700 16bc7ab 2698->2700 2701 16bc7b0-16bc811 call 16bc168 2698->2701 2699->2669 2700->2701 2707 16bc818-16bc82a 2701->2707 2708 16bc813 2701->2708 2707->2664 2708->2707
                                          APIs
                                          • LdrInitializeThunk.NTDLL(00000000), ref: 016BC8AE
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2929385309.00000000016B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 016B0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_16b0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 9cd412c2e0b31eff8c42b9962e5c553049af4c0538915aadafea2aff62182c98
                                          • Instruction ID: 07ca23bd1f0fef4908eda158a2cfdde0f113e80263838275488cb09218898e84
                                          • Opcode Fuzzy Hash: 9cd412c2e0b31eff8c42b9962e5c553049af4c0538915aadafea2aff62182c98
                                          • Instruction Fuzzy Hash: B3117C74E011099FDB04DFA8D8C4EEDBBB5FB88314F159129E904E7246DB30AA81CB64
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: d8cq
                                          • API String ID: 0-3601494702
                                          • Opcode ID: c92a8dd90e78c58f1f0f69de9299198c9c885448c45731559ef91acc88f9f290
                                          • Instruction ID: 9c70ef016be9df862cb2cad09498a5970e8e78b1650cb1de31ce180c7cd71389
                                          • Opcode Fuzzy Hash: c92a8dd90e78c58f1f0f69de9299198c9c885448c45731559ef91acc88f9f290
                                          • Instruction Fuzzy Hash: E1417C303106018FC724EB39D858B2ABBE6EF85304F2985ADD5468F7A5EB65EC85CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'^q
                                          • API String ID: 0-1614139903
                                          • Opcode ID: 2871d2e9cafb3270b8679d2fc5f0db23f72a05e343b6ce37c2e59bf7dd3b913b
                                          • Instruction ID: 089ffc9309fcd3c72cb7693d276deb0964fe74068f88ebf3fa373c075f679cc6
                                          • Opcode Fuzzy Hash: 2871d2e9cafb3270b8679d2fc5f0db23f72a05e343b6ce37c2e59bf7dd3b913b
                                          • Instruction Fuzzy Hash: C14137746102169FCB14DF28D898AAE7BB5FF48310F1440A9F90ACB3A1DB71DC91CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'^q
                                          • API String ID: 0-1614139903
                                          • Opcode ID: ab60c94544b51ea2b5e27bcf0e5d0c8011445fcb5ff841470b325f98d4a37fdf
                                          • Instruction ID: 5d9d93fb03bc796787d2020962dbea624c02202cd87762115b828f20e3de4fa7
                                          • Opcode Fuzzy Hash: ab60c94544b51ea2b5e27bcf0e5d0c8011445fcb5ff841470b325f98d4a37fdf
                                          • Instruction Fuzzy Hash: 4921B57572815A8BDB14CE25988477BBBEAEF89320F18842AE511C7244DBB5DC80CBE0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: d8cq
                                          • API String ID: 0-3601494702
                                          • Opcode ID: f368b19643a60556e79eec569a37e3fd94426056762e77829d115e877341051a
                                          • Instruction ID: ccdf7ad841669f0412230143cb3567e35ce06d22ec8876335d2aff5fea8d7af7
                                          • Opcode Fuzzy Hash: f368b19643a60556e79eec569a37e3fd94426056762e77829d115e877341051a
                                          • Instruction Fuzzy Hash: 8811A3302007024FC735DB2DC854B6EBBA6AFC2304F18896CD0568F275EBB1E8898781
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a045e8bc70877f301a5c51a53e3066f581d56bb4a4e7990c86bcc8955db130a
                                          • Instruction ID: 15fe92fe9925d6f62424ab6e8a7aa3dd5b0c70b9dcd0e953cdba18e3dd03e483
                                          • Opcode Fuzzy Hash: 8a045e8bc70877f301a5c51a53e3066f581d56bb4a4e7990c86bcc8955db130a
                                          • Instruction Fuzzy Hash: 6871E3347102128FC719EF79D89863EB7A6BF89601B58846DD906CB395DF34DC82CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80d5f29ba0742006672c081a54b1270e05d0a4da52938f458313bd2be63c3cbf
                                          • Instruction ID: 1208b9c7cbe4eac518430ff0a4885e724fbd841a967e68ada68e83fea3ec6e4c
                                          • Opcode Fuzzy Hash: 80d5f29ba0742006672c081a54b1270e05d0a4da52938f458313bd2be63c3cbf
                                          • Instruction Fuzzy Hash: 18519131B201168FD714DF39D884A7AB7E9FF4936071984A9E406CB365EB70EC81CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: db0e6ce1d2e3618d0b2a1f97da853c1f77d804b8508b7ebc930550e8c2208d71
                                          • Instruction ID: 9664e589c87eb69042d42f8d262e63d9db7bd2fad192b5629e857cd8cbe3dff3
                                          • Opcode Fuzzy Hash: db0e6ce1d2e3618d0b2a1f97da853c1f77d804b8508b7ebc930550e8c2208d71
                                          • Instruction Fuzzy Hash: 4A81AD74E012298FDB65DF29DD84BEDBBB2BB89300F1080EAD849A7254DB715E81CF44
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a101208e969660cdefc7e879b95da29266bfc09347219772b61076be3c7415f
                                          • Instruction ID: 41c04c3723cab9c6bea7e8a2a3104458f141a5c2d7283dda2c5ae06d8d60c35a
                                          • Opcode Fuzzy Hash: 0a101208e969660cdefc7e879b95da29266bfc09347219772b61076be3c7415f
                                          • Instruction Fuzzy Hash: F3414271E1030ADBDB15DFA5C890AEEFBF5AF88700F248529E405B7254DB70AD86CB90
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9cd96ea1e1c95d29f43b2fa01d855cf3113ea52692241298a13e36f39d02ec74
                                          • Instruction ID: 3b0488d8914bda6d9458234e5d6a367bb74413570c114c4af529eb928527f78b
                                          • Opcode Fuzzy Hash: 9cd96ea1e1c95d29f43b2fa01d855cf3113ea52692241298a13e36f39d02ec74
                                          • Instruction Fuzzy Hash: 2941C33061524A9FCF05DF64E848AAF3BA6FB49311F148029F9068B384CB79DDA1CB91
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6c7d15feb5b39a17314724ad508e403c9c67f033a746d9db3259e048fead9967
                                          • Instruction ID: 58ac383cda2442cefbaff9392d6e794bb2545a489c2397da1b9c96f7e01d66da
                                          • Opcode Fuzzy Hash: 6c7d15feb5b39a17314724ad508e403c9c67f033a746d9db3259e048fead9967
                                          • Instruction Fuzzy Hash: 312195357202168BEB24A72AE85873E669BEFC4755F188079D406CB394EF75CCC2D381
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2929062044.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_161d000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c784e6da7e02bf656035ca4a1a2a1fd2170936927a991321b4841d3e190eef6
                                          • Instruction ID: 52a7cf17e98cb89a1dcc30bbb94badc5fb5f1d4d40cec4ebc5c9f2c64dc02b02
                                          • Opcode Fuzzy Hash: 4c784e6da7e02bf656035ca4a1a2a1fd2170936927a991321b4841d3e190eef6
                                          • Instruction Fuzzy Hash: 64213471504200DFCB11DF58DDC8B26BBA5FB84314F28C66DD80A4B39AC33AD847CA62
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2929062044.000000000161D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0161D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_161d000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7055061061b9af2d13ba7e710bf359ce264583576f66e990ff8f38160fbd550
                                          • Instruction ID: 114fe5aa4b3850130584d49b48a0df75bcb343a417a88ab186981a2bee81e6f0
                                          • Opcode Fuzzy Hash: a7055061061b9af2d13ba7e710bf359ce264583576f66e990ff8f38160fbd550
                                          • Instruction Fuzzy Hash: 26214B715093C09FCB03CF64D994711BF71AB46214F29C5DBD8898F2A7C33A981ACB62
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9d6daef8d310f641060795940faa23b174bf4e88d9aa1a67ec8c93ad42246f24
                                          • Instruction ID: 36073b2511d0b5a63a789212795bb2a5a06e292b3dcbbfc1da03aa642852e782
                                          • Opcode Fuzzy Hash: 9d6daef8d310f641060795940faa23b174bf4e88d9aa1a67ec8c93ad42246f24
                                          • Instruction Fuzzy Hash: D81108317182945FCB06AF78981426E3FA3FFC5250B14846AE405DB396CF358D12C7A6
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 492c56ebaad160a0076afce1fb234d18623969d370dc29d5dbaa9b9974df8140
                                          • Instruction ID: fadd742ab257c10a6db30379e654af5ca48aff2f18a4775d9853f68b1acdb6a9
                                          • Opcode Fuzzy Hash: 492c56ebaad160a0076afce1fb234d18623969d370dc29d5dbaa9b9974df8140
                                          • Instruction Fuzzy Hash: 0F1167B2810349DFCB10CF99D844BDEBFF4EB48320F248419E558A7251C335A590DFA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 782f1a57d095bc02447db48c7e01dc2589b694103bead35d7f6b0731726a187c
                                          • Instruction ID: 0717f64d41a6aaa8d860277a258af451a700afad2d7ceffd2d047c113140f3a0
                                          • Opcode Fuzzy Hash: 782f1a57d095bc02447db48c7e01dc2589b694103bead35d7f6b0731726a187c
                                          • Instruction Fuzzy Hash: 49113034F101498FDB00DFF8D854B9EBBB5AB48311F00D461E908EB749EB30A9918B51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d5374ad70a6b46eae6dfaeb776606df11a058eed72ce2681ac108794ecf1ef1
                                          • Instruction ID: 93fe691b289e0a3e9e79fa133d3a1f0d46920d147d302e4914be8e93ba2e7787
                                          • Opcode Fuzzy Hash: 5d5374ad70a6b46eae6dfaeb776606df11a058eed72ce2681ac108794ecf1ef1
                                          • Instruction Fuzzy Hash: 5D1153B6800249DFCB20CF9AD844BDEBFF4EB48320F14845AE958A7251D339A594DFA1
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9cf5f520dad55f5cb1f3b0d77763e5ac863a48e1109027b978503eac00cdd8cf
                                          • Instruction ID: 745daef857b886a4b4fc1868e2e26a47d690e938b2b31f615df165ea5b30d5fb
                                          • Opcode Fuzzy Hash: 9cf5f520dad55f5cb1f3b0d77763e5ac863a48e1109027b978503eac00cdd8cf
                                          • Instruction Fuzzy Hash: FB0126327201196FCB05DE59AC00AAF7B9BEBC9650F188029F505D7380DB71DC518BA4
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1825bd297849de6da5f37dbe1b9759a5045a37a8385edb7d61d6a07197ffb59d
                                          • Instruction ID: 2c330e48ecdbf358103bbfe0de791d47bbbb8566ce43767d3fceb4925768510c
                                          • Opcode Fuzzy Hash: 1825bd297849de6da5f37dbe1b9759a5045a37a8385edb7d61d6a07197ffb59d
                                          • Instruction Fuzzy Hash: 35014473A141096FDB01DE95EC01BDF7FAAEBC8340F188029F905C3281DB76D8618BA0
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 25159ec7fb70c867115fb7209687a659ae5073fe0b58d3c83245e820fe6009a1
                                          • Instruction ID: e17e80b9609d4075e96cd44f430faf4fdc623ab2034933061eda0d317d88df56
                                          • Opcode Fuzzy Hash: 25159ec7fb70c867115fb7209687a659ae5073fe0b58d3c83245e820fe6009a1
                                          • Instruction Fuzzy Hash: D0D0673AB40018DFCB049F99E8548DDF7B6FB98221B148116E915E3265C631A925DB94
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fb38b4d03f06570add185975f7ce58fdc6318a41fd355466b12f5101562af224
                                          • Instruction ID: 67ef12f0de56cf075a0a66c9e7b3ad7995333bcda70b90929ad9681d8ef07182
                                          • Opcode Fuzzy Hash: fb38b4d03f06570add185975f7ce58fdc6318a41fd355466b12f5101562af224
                                          • Instruction Fuzzy Hash: 5CD05B305583084FC605F778FD5AA567B2AEB50205B944178D0060E39FDF7878568B44
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d2df66a28edb455d4a581d509b1a59e63f285c5d6a06c941d743fe07c5636633
                                          • Instruction ID: 25c5fb416bb3d24332c903fe35ca9dc2137d69b943afe154694f22d24b59d78f
                                          • Opcode Fuzzy Hash: d2df66a28edb455d4a581d509b1a59e63f285c5d6a06c941d743fe07c5636633
                                          • Instruction Fuzzy Hash: 98C012301483094EC505F769FD49556772EE6902117808530D00A0A39EDF787C9A4794
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 87cbcd604159647877a50a177096b6d25abbff61f393d4bbc04b76f8c21a6c44
                                          • Instruction ID: 89e31a44ef85978a438131d445459e553f85385b1c3d66d24f47793db5427278
                                          • Opcode Fuzzy Hash: 87cbcd604159647877a50a177096b6d25abbff61f393d4bbc04b76f8c21a6c44
                                          • Instruction Fuzzy Hash: 31C19F74E01218CFDB14DFA9D984B9DBBB2EF89300F6080A9D409AB365DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 677f1f1534433b61fb250fe60f8d2017f1b6de602031cf0cd2857b68bc771dd1
                                          • Instruction ID: 5f542700f76a317a507c5bfa0f830104e123d26d23ae92ac3beaa5c1e8f3544e
                                          • Opcode Fuzzy Hash: 677f1f1534433b61fb250fe60f8d2017f1b6de602031cf0cd2857b68bc771dd1
                                          • Instruction Fuzzy Hash: FEC19E74E01218CFDB54DFA9D994B9DBBB2BF89300F6080A9D409AB364DB359E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8beaaa131b0931aa7436f51cba12d54ed45a8fb83f7c830490dcebd7089bc29b
                                          • Instruction ID: 2e55821f71d9b6a141f3761543da51d6abb9921c3b25b8abb3d46af4783988fa
                                          • Opcode Fuzzy Hash: 8beaaa131b0931aa7436f51cba12d54ed45a8fb83f7c830490dcebd7089bc29b
                                          • Instruction Fuzzy Hash: 5DC1BF74E01218CFDB54DFA9D984B9DBBB2FB89300F6080A9D409AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d1cb10706b4a9f2d05448f98d7c724dfb9c3d7763837cb2d0f065e5336ce21a0
                                          • Instruction ID: be16e31207a933e6618a862d3f457e128eae29f57e81329e59c3cbaf49412027
                                          • Opcode Fuzzy Hash: d1cb10706b4a9f2d05448f98d7c724dfb9c3d7763837cb2d0f065e5336ce21a0
                                          • Instruction Fuzzy Hash: 58C1A174E01218CFDB54DFA9D984B9DBBB2EF89300F6080A9D409AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d906ec9ba2ad6746141bca535b9980fad67518a735804ff71c5a9cbe6dd0f4ba
                                          • Instruction ID: f6432cb24ffba012f04a8e67d5febc60359135563864cf303315b4779fef4424
                                          • Opcode Fuzzy Hash: d906ec9ba2ad6746141bca535b9980fad67518a735804ff71c5a9cbe6dd0f4ba
                                          • Instruction Fuzzy Hash: 68C19F74E01218CFDB14DFA9D984B9DBBB2EF89300F6080A9D409AB365DB359E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6f53fee21d3cf955304e375749c40efc984f659bd86e8087e3c584fc32396387
                                          • Instruction ID: 7fc8f8918bc25f5a7851a0741ba4f931db41e726bebc21f4e557be909e5a85fe
                                          • Opcode Fuzzy Hash: 6f53fee21d3cf955304e375749c40efc984f659bd86e8087e3c584fc32396387
                                          • Instruction Fuzzy Hash: 41C19F74E01218CFDB14DFA9D994B9DBBB2EF89300F6080A9D409AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e0c1d262e72c4c0792e88013a2beea727dcf6d1fff7a9419d1ac691730f4b712
                                          • Instruction ID: 2a88286bca967ea9e4a7a94f9e3acb596c6f2a66cbe1a6da06e72994b6b4619b
                                          • Opcode Fuzzy Hash: e0c1d262e72c4c0792e88013a2beea727dcf6d1fff7a9419d1ac691730f4b712
                                          • Instruction Fuzzy Hash: 02C1AE74E01218CFDB14DFA9D984B9DBBB2EF89300F6080A9D409AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9d9fcf42fc4344ae1b8dc3f6c763c76e768e78974886936dc15a16f4e1e2a31
                                          • Instruction ID: 7ef794db5e797290e7d2895ad9286c1f0646a9a1b4d0b70060fb02c8c079880d
                                          • Opcode Fuzzy Hash: b9d9fcf42fc4344ae1b8dc3f6c763c76e768e78974886936dc15a16f4e1e2a31
                                          • Instruction Fuzzy Hash: 7EC1AF74E01218CFDB14DFA9D984B9DBBB2EF89300F6080A9D409AB364DB359E85CF15
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5cfff80eb73737f6f089827f3697842051aaf5fa3cebabbf76f43fe5276422d4
                                          • Instruction ID: 8a9a146ddc5fffde507750f07cf0f73a13a71462692e6106dd86b919e7144b5b
                                          • Opcode Fuzzy Hash: 5cfff80eb73737f6f089827f3697842051aaf5fa3cebabbf76f43fe5276422d4
                                          • Instruction Fuzzy Hash: CDC1AF74E01218CFDB14DFA9D984B9DBBB2BF89300F6080A9D409AB364DB359E85CF10
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 19181693975a328cc88b4c46190b72dce7d1fc140acd5f6d1a93ef878c3f0bf8
                                          • Instruction ID: f95d9326cdd4f7c5c9f3b54b54d44e6af8fd7d8327148e706debf9a1db41e501
                                          • Opcode Fuzzy Hash: 19181693975a328cc88b4c46190b72dce7d1fc140acd5f6d1a93ef878c3f0bf8
                                          • Instruction Fuzzy Hash: A0C19F74E01218CFDB54DFA9D984B9DBBB2EB89300F6080A9D409AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9eb243cdaa0e047fa21eca905afd909cf3f73855e6aaba9098b677a020406371
                                          • Instruction ID: 8871bb179f6a0703648fceb2d88f634d48c77b15d99b6e213b16be0b9a21a696
                                          • Opcode Fuzzy Hash: 9eb243cdaa0e047fa21eca905afd909cf3f73855e6aaba9098b677a020406371
                                          • Instruction Fuzzy Hash: F5C1B074E01218CFDB14DFA9D984B9DBBB2EF89300F5080A9D409AB365DB359E85CF54
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d01c9a87c41f9cab9ef61364d73dd54beb564c1bbfec60a25277202576940633
                                          • Instruction ID: 8f04ee894761ec0405a320746b1f94253a1749091ec7f7ffc50e9ce8aa7458f4
                                          • Opcode Fuzzy Hash: d01c9a87c41f9cab9ef61364d73dd54beb564c1bbfec60a25277202576940633
                                          • Instruction Fuzzy Hash: 09C19074E01218CFDB14DFA9D994B9DBBB2EF89300F5080A9D809AB364DB355E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 54fe92b75829e5f95ce33b10334c5972e8a77d1a85cc186af646e25e7b8e04a3
                                          • Instruction ID: 9c2a0c1672f65d7e76ff648880271d8ff8f0043b8735c5866fedbf0596449e65
                                          • Opcode Fuzzy Hash: 54fe92b75829e5f95ce33b10334c5972e8a77d1a85cc186af646e25e7b8e04a3
                                          • Instruction Fuzzy Hash: 88C1A174E01218CFDB14DFA9D984B9DBBB2EF89300F6084A9D809AB364DB355E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fe1f287698b37d9d1388390475b8fbad3f604cac795f125236636c4e2310057f
                                          • Instruction ID: 1cccf52b7c54cb8d3a6c928ffaf7fc8cd261ebbb0c4bd953518669283ae605be
                                          • Opcode Fuzzy Hash: fe1f287698b37d9d1388390475b8fbad3f604cac795f125236636c4e2310057f
                                          • Instruction Fuzzy Hash: 5BC19E74E01218CFDB14DFA9D984B9DBBB2BF89300F6081A9D409AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4c16561df1605ce058a743cba347528ea35577a33956465825376f56f65c66b5
                                          • Instruction ID: eb2535f1b84b39e6055a2b6f3f22c27cdd8ac4236f64f71eeb745455513337da
                                          • Opcode Fuzzy Hash: 4c16561df1605ce058a743cba347528ea35577a33956465825376f56f65c66b5
                                          • Instruction Fuzzy Hash: CAC19F74E01218CFDB14DFA9D994B9DBBB2BF89300F6080A9D409AB364DB359E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a3d128045a6a4ca6aa310e702988b855716f30e8b7c324e673cb3d190588550b
                                          • Instruction ID: eecff105c318205d2d5f7311a8009e9cfb9025d402d12c2b351841af04e9d227
                                          • Opcode Fuzzy Hash: a3d128045a6a4ca6aa310e702988b855716f30e8b7c324e673cb3d190588550b
                                          • Instruction Fuzzy Hash: A7C19F74E01218CFDB14DFA9D984B9DBBB2EF89300F6080A9D409AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: abef0e7caa41ee47d48710791eabe9fa58fd6e0d4adaba0b39135c5e13948fe1
                                          • Instruction ID: 691097bd5991389e7d74b40a635ef3573b48047e6c55eb5eb0669ee610be6f5d
                                          • Opcode Fuzzy Hash: abef0e7caa41ee47d48710791eabe9fa58fd6e0d4adaba0b39135c5e13948fe1
                                          • Instruction Fuzzy Hash: DFC19174E01218CFDB54DFA9D984B9DBBB2FB89300F5080A9D409AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 86af55db4b91e59ad0db9b4ae205976c8a905f455e4baa6439eee223b981be7e
                                          • Instruction ID: 6d4985897b38ea17a769f5ce427fa8ab4127aea78456225f1872c79f75d74dda
                                          • Opcode Fuzzy Hash: 86af55db4b91e59ad0db9b4ae205976c8a905f455e4baa6439eee223b981be7e
                                          • Instruction Fuzzy Hash: CEC19074E01218CFDB54DFA9D984B9DBBB2FB89300F5080A9D809AB364DB359E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7d0b772c8c6388b9ff055f4028f9ab541f663652446f02ab91de1d74d86b0ed8
                                          • Instruction ID: df5f9fdfc7b78e02afee8348c39fab53ee27d231d4d8aa8105620ac6be2ad600
                                          • Opcode Fuzzy Hash: 7d0b772c8c6388b9ff055f4028f9ab541f663652446f02ab91de1d74d86b0ed8
                                          • Instruction Fuzzy Hash: 91C19F74E01218CFDB54DFA9D994B9DBBB2EF89300F6080A9D409AB364DB359E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b08241555fb796624f457d9e0b7fe11e089899ccd81052e149cabc660c3fc3c2
                                          • Instruction ID: dc45bd11486dd5d44bcbae82430aa643e8b66c46459d0903fbb7527d6f9ea92f
                                          • Opcode Fuzzy Hash: b08241555fb796624f457d9e0b7fe11e089899ccd81052e149cabc660c3fc3c2
                                          • Instruction Fuzzy Hash: 26C19174E01218CFDB14DFA9D984B9DBBB2EF89300F5080A9D409AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 08f037b1abae45f8fe0d85c40f6c5164f7bb346027ed355203b75f58802dd504
                                          • Instruction ID: 8261bbe35373e12331bc16386de0c24c25d365d2087470d65629f169b009e8ee
                                          • Opcode Fuzzy Hash: 08f037b1abae45f8fe0d85c40f6c5164f7bb346027ed355203b75f58802dd504
                                          • Instruction Fuzzy Hash: 6FC1AF74E01218CFDB14DFA9D984B9DBBB2EF89300F6080A9D409AB364DB359E85CF15
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3c5b86c52ccfb5b5ad626c90c5829e3f54922049747e10245c52930de7f5af6a
                                          • Instruction ID: f604c007ce89739219d7fe63da7d01a4f37d58e9f0e74f2b28f399e68e92b541
                                          • Opcode Fuzzy Hash: 3c5b86c52ccfb5b5ad626c90c5829e3f54922049747e10245c52930de7f5af6a
                                          • Instruction Fuzzy Hash: 8DC19D74E01218CFDB14DFA9D994B9DBBB2BF89300F6080A9D409AB364DB359E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 13ab7c97e2f6771dc86fc3343853fcbe0d60d92d580759aa1f080c9f1b61d9b4
                                          • Instruction ID: db7c25b9bf5b81bafbf8f87a8f79f3475da03005188d57529f56eead73e89d82
                                          • Opcode Fuzzy Hash: 13ab7c97e2f6771dc86fc3343853fcbe0d60d92d580759aa1f080c9f1b61d9b4
                                          • Instruction Fuzzy Hash: F2C1AF74E01218CFDB14DFA9D984B9DBBB2EF89300F6080A9D409AB365DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 05dc45b0d31316cd3626bdef686c34c78332db804c2dad7daa85252b0bde6769
                                          • Instruction ID: f37338b2d671b80f80d0cca5639c6fb5a1e12ebc0cae4cb7fd0f083ae834bbe5
                                          • Opcode Fuzzy Hash: 05dc45b0d31316cd3626bdef686c34c78332db804c2dad7daa85252b0bde6769
                                          • Instruction Fuzzy Hash: A1C19E74E01218CFDB14DFA9D984B9DBBB2AF89300F6080A9D409AB365DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e63b927a4451e12bbc5f214c9d8e644a71ce5183bbebf412c16b9fc2540ea8e8
                                          • Instruction ID: e329114a929ccd4dc2999235c1a6f2737a639f891ea616f707fe2e4ff3bccf1f
                                          • Opcode Fuzzy Hash: e63b927a4451e12bbc5f214c9d8e644a71ce5183bbebf412c16b9fc2540ea8e8
                                          • Instruction Fuzzy Hash: C7C19F74E01218CFDB14DFA9D994B9DBBB2BB89300F5080A9D809AB365DB359E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 07e334dffb42d609e2705bcab8ec1bfc10f6222effdee30e445da700b1ce88e7
                                          • Instruction ID: 53226f130b381bc69c552d4a8768168ff9c1f7fd4326d380cb37cfaccd76ada3
                                          • Opcode Fuzzy Hash: 07e334dffb42d609e2705bcab8ec1bfc10f6222effdee30e445da700b1ce88e7
                                          • Instruction Fuzzy Hash: 75C19F74E01218CFDB14DFA9D984B9DBBB2EF89300F5080A9D809AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ade87458e8b85d42c58f5529b78c5d24f6f15d635f1505fcaa69367c3631543e
                                          • Instruction ID: 6337378fc3497520b4a0e95c74d3c3c05bce0c2c1f9311eeaa0980c0985d12a7
                                          • Opcode Fuzzy Hash: ade87458e8b85d42c58f5529b78c5d24f6f15d635f1505fcaa69367c3631543e
                                          • Instruction Fuzzy Hash: 4CC1AE74E01218CFDB14DFA9D984B9DBBB2BF89300F6080A9D409AB365DB359E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 493eda5030623a7bc097fa8491f9da1042394b0c25b9045abcdbde286e828e6b
                                          • Instruction ID: 739293f89e457733ff261bb598e8bac456572424b0dd85803657d79ad5eca5a2
                                          • Opcode Fuzzy Hash: 493eda5030623a7bc097fa8491f9da1042394b0c25b9045abcdbde286e828e6b
                                          • Instruction Fuzzy Hash: 0DC1A074E01218CFDB14DFA9D994B9DBBB2EF89300F5080A9D409AB364DB355E85CF50
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 202d6c844ad8e311b88fa16b18c12f3ee7c91bbfae9444fd903ebd3943a35e53
                                          • Instruction ID: 0cd15dcec413a8e204632eed061d8d2b45a4987fdeb89e67a1a0aa461c96c03e
                                          • Opcode Fuzzy Hash: 202d6c844ad8e311b88fa16b18c12f3ee7c91bbfae9444fd903ebd3943a35e53
                                          • Instruction Fuzzy Hash: 5FC19074E01218CFDB14DFA9D984B9DBBB2FB89300F5080A9D809AB364DB359E85CF51
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2abd23c9b3b2dd8cc7f40f73e1bb35ef82902195359e124f75f250e3a6b58fe8
                                          • Instruction ID: ba3a8b246913c1d2434b5350b09d5db7351cb203756d30863dbc5f53588adaf0
                                          • Opcode Fuzzy Hash: 2abd23c9b3b2dd8cc7f40f73e1bb35ef82902195359e124f75f250e3a6b58fe8
                                          • Instruction Fuzzy Hash: 64C19074E01218CFDB14DFA9D994B9DBBB2FB89304F6080A9D809A7364DB355E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1650a2db61f49232a2dc9c4d9ca14f5ee62cce6bc5a8c54fbc045292279ceb7d
                                          • Instruction ID: 90dff078054a0c1c5a78945df06a9fcab0414b61e7e15ce3b5377f0d0adab793
                                          • Opcode Fuzzy Hash: 1650a2db61f49232a2dc9c4d9ca14f5ee62cce6bc5a8c54fbc045292279ceb7d
                                          • Instruction Fuzzy Hash: 88C19E74E01218CFDB54DFA9D984B9DBBB2EF89300F6080A9D409AB364DB359E85CF11
                                          Memory Dump Source
                                          • Source File: 00000004.00000002.2930495061.00000000032D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 032D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_4_2_32d0000_Bill Of Lading.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26bc84d6b9d3a88e2badd7361d841559523568c8f89f662d6afd90a59e052950
                                          • Instruction ID: 8690844b2804f8206dd1c49ce1677b260fe219c5ec0137230afe83e0c1c15148
                                          • Opcode Fuzzy Hash: 26bc84d6b9d3a88e2badd7361d841559523568c8f89f662d6afd90a59e052950
                                          • Instruction Fuzzy Hash: A6C19E74E01218CFDB54DFA9D984B9DBBB2BF89300F6080A9D409AB364DB359E85CF51