Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rPROFORMAINVOICE-PO_ATS_1036.exe

Overview

General Information

Sample name:rPROFORMAINVOICE-PO_ATS_1036.exe
Analysis ID:1518225
MD5:ccdc6abb91cba9b82fcea9f02aaeffac
SHA1:8badde3b9cb21b8f6cd0fcf75f8b94a545fa35ea
SHA256:55ead53e3dff6db18ab2e0a9e353c4f39e6d0ce7ad0dd506dd7ce92d866b7eaa
Tags:AsyncRATexeuser-Porcupine
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Drops PE files to the user root directory
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Yara signature match

Classification

  • System is w10x64
  • rPROFORMAINVOICE-PO_ATS_1036.exe (PID: 6180 cmdline: "C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exe" MD5: CCDC6ABB91CBA9B82FCEA9F02AAEFFAC)
    • conhost.exe (PID: 6344 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 3756 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • WerFault.exe (PID: 6604 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 1588 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["67.215.224.133"], "Port": "5454", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3246247886.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    00000002.00000002.3246247886.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6e88:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6f25:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x703a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6b34:$cnc4: POST / HTTP/1.1
    00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x319e18:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x319eb5:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x319fca:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x319ac4:$cnc4: POST / HTTP/1.1
      00000000.00000002.1694534154.000002544E000000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Click to see the 3 entries
        SourceRuleDescriptionAuthorStrings
        0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x5288:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x5325:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x543a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x4f34:$cnc4: POST / HTTP/1.1
            0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x5288:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x5325:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x543a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x4f34:$cnc4: POST / HTTP/1.1
            0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.unpackJoeSecurity_XWormYara detected XWormJoe Security
              Click to see the 9 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-09-25T14:26:58.181877+020028531931Malware Command and Control Activity Detected192.168.2.45815467.215.224.1335454TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000002.00000002.3247456184.0000000002B51000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["67.215.224.133"], "Port": "5454", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V3.1"}
              Source: C:\Users\user\rPROFORMAINVOICE-PO_ATS_1036.exeReversingLabs: Detection: 65%
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeReversingLabs: Detection: 65%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpackString decryptor: 67.215.224.133
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpackString decryptor: 5454
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpackString decryptor: <123456789>
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpackString decryptor: <Xwormmm>
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpackString decryptor: USB.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\exe\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Accessibility.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdbCw? source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdbRSDS source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: oC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb$ source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.PDBs source: MSBuild.exe, 00000002.00000002.3246919937.0000000001170000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n0C:\Windows\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb( source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.00000000010E8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\MSBuild.pdbpdbild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.0000000001170000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Xml.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: o.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbZE source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Microsoft.VisualBasic.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: %%.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.3246919937.0000000001170000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.3246919937.0000000001163000.00000004.00000020.00020000.00000000.sdmp, WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.pdbH source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Management.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\exe\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Management.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbSx, source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: symbols\dll\mscorlib.pdbLb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.pdb' source: MSBuild.exe, 00000002.00000002.3246919937.0000000001170000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WER24F5.tmp.dmp.9.dr
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 4x nop then push rbx0_2_00007FF78BA0CC30
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 4x nop then push rbx0_2_00007FF78B9DFAA0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF78BA37A90
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF78B9DF9C0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 4x nop then mov rax, rcx0_2_00007FF78B9C9FC0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 4x nop then push rdi0_2_00007FF78BA34450
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 4x nop then push rdi0_2_00007FF78BA30200

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:58148 -> 67.215.224.133:5454
              Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:58154 -> 67.215.224.133:5454
              Source: Malware configuration extractorURLs: 67.215.224.133
              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 67.215.224.133:5454
              Source: global trafficTCP traffic: 192.168.2.4:58130 -> 162.159.36.2:53
              Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
              Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
              Source: unknownTCP traffic detected without corresponding DNS query: 93.184.221.240
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: unknownTCP traffic detected without corresponding DNS query: 67.215.224.133
              Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
              Source: MSBuild.exe, 00000002.00000002.3247456184.0000000002B51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Amcache.hve.9.drString found in binary or memory: http://upx.sf.net
              Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, XLogger.cs.Net Code: KeyboardLayout

              System Summary

              barindex
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000002.00000002.3246247886.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000002.1694534154.000002544E000000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: initial sampleStatic PE information: Filename: rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B980C500_2_00007FF78B980C50
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B97DFD00_2_00007FF78B97DFD0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9693400_2_00007FF78B969340
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9782000_2_00007FF78B978200
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9761900_2_00007FF78B976190
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B97D16A0_2_00007FF78B97D16A
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9788300_2_00007FF78B978830
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9715200_2_00007FF78B971520
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B974CD90_2_00007FF78B974CD9
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B985C200_2_00007FF78B985C20
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B987C790_2_00007FF78B987C79
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98BBA00_2_00007FF78B98BBA0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78BA17BA00_2_00007FF78BA17BA0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B97FB400_2_00007FF78B97FB40
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78BA12AC00_2_00007FF78BA12AC0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B994A400_2_00007FF78B994A40
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B966A500_2_00007FF78B966A50
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B956A500_2_00007FF78B956A50
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B979A500_2_00007FF78B979A50
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9899C30_2_00007FF78B9899C3
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B961A000_2_00007FF78B961A00
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98F9600_2_00007FF78B98F960
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9680D00_2_00007FF78B9680D0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78BA200E00_2_00007FF78BA200E0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B96EFE00_2_00007FF78B96EFE0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B983F600_2_00007FF78B983F60
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98BEA00_2_00007FF78B98BEA0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B97FDD00_2_00007FF78B97FDD0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B972D300_2_00007FF78B972D30
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9744D00_2_00007FF78B9744D0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98B4F00_2_00007FF78B98B4F0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B97A4200_2_00007FF78B97A420
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9594300_2_00007FF78B959430
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78BA034800_2_00007FF78BA03480
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9604700_2_00007FF78B960470
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9814700_2_00007FF78B981470
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9583C40_2_00007FF78B9583C4
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98D3200_2_00007FF78B98D320
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9843900_2_00007FF78B984390
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9703600_2_00007FF78B970360
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9823700_2_00007FF78B982370
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9892CE0_2_00007FF78B9892CE
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9852E00_2_00007FF78B9852E0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78BA2E2400_2_00007FF78BA2E240
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9582200_2_00007FF78B958220
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98F2800_2_00007FF78B98F280
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9891B00_2_00007FF78B9891B0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9912000_2_00007FF78B991200
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9752000_2_00007FF78B975200
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98B1800_2_00007FF78B98B180
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B96E8A00_2_00007FF78B96E8A0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B95A8B00_2_00007FF78B95A8B0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9B19100_2_00007FF78B9B1910
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9888D90_2_00007FF78B9888D9
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B97A8500_2_00007FF78B97A850
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98A7B00_2_00007FF78B98A7B0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98C8000_2_00007FF78B98C800
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9767F00_2_00007FF78B9767F0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9627500_2_00007FF78B962750
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B97B6B00_2_00007FF78B97B6B0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9736400_2_00007FF78B973640
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9835C00_2_00007FF78B9835C0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9766100_2_00007FF78B976610
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B98E5400_2_00007FF78B98E540
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_00FFEB982_2_00FFEB98
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: String function: 00007FF78B95C1A0 appears 63 times
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 1588
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeBinary or memory string: OriginalFilename vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe, 00000000.00000002.1694534154.000002544EA00000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSYSWIN32TaskStartPromise.dllR vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe, 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSYSWIN32TaskStartPromise.dllR vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe, 00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSYSWIN32TaskStartPromise.dllR vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe, 00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient2.exe4 vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe, 00000000.00000002.1694534154.000002544E000000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSYSWIN32TaskStartPromise.dllR vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe, 00000000.00000002.1694534154.000002544E000000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient2.exe4 vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe, 00000000.00000002.1693833580.000002544BF88000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSYSWIN32TaskStartPromise.dllR vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeBinary or memory string: OriginalFilenameSYSWIN32TaskStartPromise.dllR vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe.0.drBinary or memory string: OriginalFilenameSYSWIN32TaskStartPromise.dllR vs rPROFORMAINVOICE-PO_ATS_1036.exe
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000002.00000002.3246247886.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000002.1694534154.000002544E000000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb(
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/6@1/1
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B961830 LookupPrivilegeValueW,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLargePageMinimum,VirtualAlloc,GetCurrentProcess,VirtualAllocExNuma,0_2_00007FF78B961830
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeFile created: C:\Users\user\rPROFORMAINVOICE-PO_ATS_1036.exeJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6344:120:WilError_03
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3756
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\gZovO7Orbqb3wmDO
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\1a708cb1-4ad5-4c75-a775-0cae34537d3dJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeReversingLabs: Detection: 65%
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeFile read: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exe "C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exe"
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 1588
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeSection loaded: icu.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic file information: File size 1464832 > 1048576
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Xml.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\exe\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Accessibility.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\mscorlib.pdbCw? source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.ni.pdbRSDS source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: oC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb$ source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.PDBs source: MSBuild.exe, 00000002.00000002.3246919937.0000000001170000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n0C:\Windows\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: f:\binaries\Intermediate\ndp_msbuild\xmakecommandline.csproj_1613737345\objr\x86\MSBuild.pdb( source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.00000000010E8000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\MSBuild.pdbpdbild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdbRSDS source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.0000000001170000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Xml.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: o.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbZE source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Microsoft.VisualBasic.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: %%.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: System.Windows.Forms.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.3246919937.0000000001170000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.3246919937.0000000001163000.00000004.00000020.00020000.00000000.sdmp, WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Drawing.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.pdbH source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Management.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\exe\MSBuild.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: mscorlib.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Management.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdbSx, source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\mscorlib.pdb source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: symbols\dll\mscorlib.pdbLb source: MSBuild.exe, 00000002.00000002.3249101557.000000000540A000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.pdb' source: MSBuild.exe, 00000002.00000002.3246919937.0000000001170000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.ni.pdb source: WER24F5.tmp.dmp.9.dr
              Source: Binary string: System.Core.ni.pdbRSDS source: WER24F5.tmp.dmp.9.dr
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Helper.SB(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { Pack[2] }}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, Messages.cs.Net Code: Memory
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: section name: .managed
              Source: rPROFORMAINVOICE-PO_ATS_1036.exeStatic PE information: section name: hydrated
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe.0.drStatic PE information: section name: .managed
              Source: rPROFORMAINVOICE-PO_ATS_1036.exe.0.drStatic PE information: section name: hydrated
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeFile created: C:\Users\user\rPROFORMAINVOICE-PO_ATS_1036.exeJump to dropped file
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeFile created: C:\Users\user\rPROFORMAINVOICE-PO_ATS_1036.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeFile created: C:\Users\user\rPROFORMAINVOICE-PO_ATS_1036.exeJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeMemory allocated: 25447A30000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: FF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 4B50000 memory reserve | memory write watchJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 1705Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 8096Jump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-29135
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1508Thread sleep time: -23058430092136925s >= -30000sJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3916Thread sleep count: 1705 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 3916Thread sleep count: 8096 > 30Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B961460 GetSystemInfo,GetNumaHighestNodeNumber,GetCurrentProcess,GetProcessGroupAffinity,GetLastError,GetCurrentProcess,GetProcessAffinityMask,0_2_00007FF78B961460
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: Amcache.hve.9.drBinary or memory string: VMware
              Source: Amcache.hve.9.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.9.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.9.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.9.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.9.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.9.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.9.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.9.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.9.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.9.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: MSBuild.exe, 00000002.00000002.3246919937.000000000112D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Amcache.hve.9.drBinary or memory string: vmci.sys
              Source: Amcache.hve.9.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.9.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.9.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.9.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.9.drBinary or memory string: VMware20,1
              Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.9.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.9.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.9.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.9.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.9.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.9.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.9.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.9.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.9.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.9.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B9BB64C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF78B9BB64C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 40A000Jump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 40C000Jump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: AEE008Jump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"Jump to behavior
              Source: MSBuild.exe, 00000002.00000002.3247456184.0000000002BAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: MSBuild.exe, 00000002.00000002.3247456184.0000000002BAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managert-^q
              Source: MSBuild.exe, 00000002.00000002.3247456184.0000000002BAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: @\^q@\^q'PING!<Xwormmm>Program Manager<Xwormmm>0
              Source: MSBuild.exe, 00000002.00000002.3247456184.0000000002BAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
              Source: MSBuild.exe, 00000002.00000002.3247456184.0000000002BAE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $^q'PING!<Xwormmm>Program Manager<Xwormmm>0Te^q
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: GetLocaleInfoEx,0_2_00007FF78B9E8FB0
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: GetLocaleInfoEx,0_2_00007FF78B9E9080
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exeCode function: 0_2_00007FF78B960030 GetSystemTimeAsFileTime,0_2_00007FF78B960030
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.9.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: MSBuild.exe, 00000002.00000002.3246919937.0000000001170000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.3246919937.00000000010E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: Amcache.hve.9.drBinary or memory string: MsMpEng.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.3246247886.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1694534154.000002544E000000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rPROFORMAINVOICE-PO_ATS_1036.exe PID: 6180, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3756, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544bf12d90.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e23ff70.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.rPROFORMAINVOICE-PO_ATS_1036.exe.2544e22a9e8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000002.00000002.3246247886.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1694534154.000002544E000000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: rPROFORMAINVOICE-PO_ATS_1036.exe PID: 6180, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3756, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              111
              Masquerading
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Input Capture
              12
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Native API
              Boot or Logon Initialization Scripts312
              Process Injection
              1
              Disable or Modify Tools
              LSASS Memory121
              Security Software Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              31
              Virtualization/Sandbox Evasion
              Security Account Manager2
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Access Token Manipulation
              NTDS31
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput Capture12
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script312
              Process Injection
              LSA Secrets1
              Application Window Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
              Deobfuscate/Decode Files or Information
              Cached Domain Credentials25
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
              Obfuscated Files or Information
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
              Software Packing
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              DLL Side-Loading
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              rPROFORMAINVOICE-PO_ATS_1036.exe66%ReversingLabsWin64.Trojan.XWorm
              SourceDetectionScannerLabelLink
              C:\Users\user\rPROFORMAINVOICE-PO_ATS_1036.exe66%ReversingLabsWin64.Trojan.XWorm
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://upx.sf.net0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              67.215.224.1330%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              fp2e7a.wpc.phicdn.net
              192.229.221.95
              truefalse
                unknown
                198.187.3.20.in-addr.arpa
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  67.215.224.133true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://upx.sf.netAmcache.hve.9.drfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMSBuild.exe, 00000002.00000002.3247456184.0000000002B51000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  67.215.224.133
                  unknownUnited States
                  8100ASN-QUADRANET-GLOBALUStrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1518225
                  Start date and time:2024-09-25 14:24:28 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 16s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:11
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:rPROFORMAINVOICE-PO_ATS_1036.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@5/6@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:Failed
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 4.245.163.56, 2.16.100.168, 88.221.110.91, 52.165.164.15, 192.229.221.95, 40.69.42.241, 20.3.187.198, 4.175.87.197, 20.12.23.50, 20.190.159.0, 40.126.31.67, 20.190.159.75, 20.190.159.68, 20.190.159.2, 20.190.159.4, 20.190.159.64, 20.190.159.71, 20.189.173.22
                  • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, www.tm.v4.a.prd.aadg.akadns.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, login.msa.msidentity.com, download.windowsupdate.com.edgesuite.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, glb.cws.prod.dcat.dsp.trafficmanager.net, ocsp.edge.digicert.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  • VT rate limit hit for: rPROFORMAINVOICE-PO_ATS_1036.exe
                  TimeTypeDescription
                  08:25:27API Interceptor3247831x Sleep call for process: MSBuild.exe modified
                  08:27:56API Interceptor1x Sleep call for process: WerFault.exe modified
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  fp2e7a.wpc.phicdn.net9YOOBuBZtj.exeGet hashmaliciousScreenConnect ToolBrowse
                  • 192.229.221.95
                  6Zx9GI028y.exeGet hashmaliciousScreenConnect ToolBrowse
                  • 192.229.221.95
                  y4FSQMICGJ.exeGet hashmaliciousScreenConnect ToolBrowse
                  • 192.229.221.95
                  75kTq6Y4Ck.exeGet hashmaliciousScreenConnect ToolBrowse
                  • 192.229.221.95
                  4ZVhm9dOfO.exeGet hashmaliciousScreenConnect ToolBrowse
                  • 192.229.221.95
                  https://u47138932.ct.sendgrid.net/ls/click?upn=u001.WHU40Igm1lAOGuvv-2FdvXEBICo64I-2Fww-2F4GhUU-2BYAtPpG2Rlg5ZO0npuLCJUQ0th-2Bv7jiqZNwXXutQuRULDJ5gA-3D-3D49di_E3jX7UdwUvWW16GmiaKN7FkCRVuYellJjDDE2zc2thlrACmxCpdiqjVeZzrtBBh53HG3diRIaSJROX1IVISX2iuKwpzfFmWnT0Yv1uEikhvgBfP7OQn0yqcVecNZ3iDwFjYYj57BnYIOhDpPo4MTwnwub6p2B5GRghh6ChqtreR11LT6WpJx-2FcmruvU1xEGNLDsifcIUnQKgQbqTLc4vnXmCfsmjYgCm0e-2BBQgOUn5pv0HzAWJQ2BG0SXnTVfDBoH7QelwM6AwzcQNq8DXMWRJRTblKEKJioXfF0zfGmiftnizJbYIB8-2FjHg4nz-2F3zTP2EmyELP4FGD6jsuXOmnDDCfknw4WJyH33Agg5tAwQOjntCHuuZi6vcl6SPJyVNsvolpRM7Yp8Ri5gQksC1pfj2rC-2F45nF8bhK3EHs4VmIWpDl-2FDZcfZMpI50qinszZEtLmF7m8gZv-2BkUvlKpTvm-2FfTLIu2iSZcVBG0sGFMm-2FoR-2BR6O0SBoX53s7fd6zbqziWuPg2tLfHjJjraKZEwqpZnbaHuJ-2F-2F-2FWqvTwBSaffuKdeB6vfA0b-2FDnJiZ4Bk6qAzG08EbfonMWuWwAbXPPNlz7-2FPhMaRZIj5qYmImFuGJee8m0N-2Bht2q6llhNWiP4ZMXXLYVHteEexUAugvquxsOpI6vqnHcQgc-2FVpUHpOp2BMHZLkW2qrpJH8BCyfTdYFr6iQwd7HzQDsc429SLZFXzK95V1E-2FXG1a3sGhwhN8XAY0nnJSxwwGLn2jP8dTD9xQetC2exPt5-2F-2FqgJQ5bXuDHvFZTrNGco6SJBPNyS9ynWfuYpvIc2j9CNYEYBIXjxGimgN-2BOoaRDXClnNK36cnrLjExHKdCfLb6GbsD03m-2Bb3lMo-3DGet hashmaliciousUnknownBrowse
                  • 192.229.221.95
                  https://xv5jxkerkk.nl-ams-1.linodeobjects.com/index.htm?url=dc-systemes.jcrnastercontracting.com&corid=Get hashmaliciousHtmlDropperBrowse
                  • 192.229.221.95
                  file.exeGet hashmaliciousSmokeLoaderBrowse
                  • 192.229.221.95
                  https://auth.securetnet.com/44850b/fb7c75ee-a59f-4721-a974-2d0b2fad0b9bGet hashmaliciousUnknownBrowse
                  • 192.229.221.95
                  https://app.pipefy.com/public/phase_redirect/f86fa292-1317-4dc5-8112-3af168025951?origin=emailGet hashmaliciousHTMLPhisherBrowse
                  • 192.229.221.95
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  ASN-QUADRANET-GLOBALUS34467890.docGet hashmaliciousUnknownBrowse
                  • 66.63.187.123
                  Swift.docGet hashmaliciousAgentTeslaBrowse
                  • 66.63.187.123
                  XjPA2pnUhC.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                  • 192.161.184.44
                  BANK PAYMENT COPY.docGet hashmaliciousXWormBrowse
                  • 66.63.187.123
                  https://2836500.vip/Get hashmaliciousUnknownBrowse
                  • 27.0.235.55
                  #U0631#U0648#U0632 #U0633#U06cc#U0627#U0647 #U06a9#U0627#U0631#U06af#U0631.exeGet hashmaliciousUnknownBrowse
                  • 45.95.233.246
                  #U0631#U0648#U0632 #U0633#U06cc#U0627#U0647 #U06a9#U0627#U0631#U06af#U0631.exeGet hashmaliciousUnknownBrowse
                  • 45.95.233.246
                  #U0641#U0631#U0627#U062e#U0648#U0627#U0646 #U0631#U0648#U0632 #U06a9#U0627#U0631#U06af#U0631.exeGet hashmaliciousUnknownBrowse
                  • 45.95.233.246
                  Drawing_Products_Materials_and_Samples_IMG.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                  • 64.188.18.75
                  11062370MXQRQ353000718_001.docGet hashmaliciousUnknownBrowse
                  • 66.63.187.123
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):1.1701646477935583
                  Encrypted:false
                  SSDEEP:192:/tzxScO3aXGT0BU/Ka6THyChC/zuiFzZ24IO8G:Zxi3aXxBU/KaWSp/zuiFzY4IO8G
                  MD5:66CC108814C483D97B492FE85EFE7336
                  SHA1:CA37A90FF23051EF908170041292FAD04D30C5D8
                  SHA-256:EC13F2AA645508A955EACF5DC02C1789964B8C8C8AAA2F2C90607C0A09308735
                  SHA-512:361F1EB08BECF5D45A49C66E2A532BF4F3DE66ACA14F65C979D6F52B62C9DE285C332434A9D6ACC0F88AC1072CF9DF474722A0EEB9A359755856DA65E6B44291
                  Malicious:false
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.1.7.4.0.8.5.9.0.7.9.3.1.3.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.1.7.4.0.8.6.0.1.5.7.3.9.6.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.8.3.a.3.f.6.a.-.b.a.4.5.-.4.5.2.e.-.b.3.7.a.-.b.9.8.4.9.7.5.3.1.5.1.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.f.a.c.4.4.8.c.-.0.1.d.a.-.4.0.1.7.-.8.a.c.d.-.8.5.c.a.0.0.8.8.e.e.e.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.s.b.u.i.l.d...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.M.S.B.u.i.l.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.a.c.-.0.0.0.1.-.0.0.1.4.-.b.0.c.8.-.e.0.f.c.4.5.0.f.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.e.6.2.5.6.a.0.1.5.9.6.8.8.f.0.5.6.0.b.0.1.5.d.a.4.d.9.6.7.f.4.1.c.b.f.8.c.9.b.d.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Wed Sep 25 12:27:39 2024, 0x1205a4 type
                  Category:dropped
                  Size (bytes):330460
                  Entropy (8bit):3.6666584031052403
                  Encrypted:false
                  SSDEEP:3072:y3dCx2c0s4uEqkdXW8rfwqtNnY+LTg3NytN4XfUlOl:ytPc0s47wknYsTgdyte
                  MD5:90CC49AAC8858896A4098D11817730D6
                  SHA1:8FDBE9DFF0FF0DC4EB501706B1C76274399F753F
                  SHA-256:5E291D8EF29B861E061965F244C3F6C7AF73B092BD1CDC4874F8591FE993B6F2
                  SHA-512:7F5183B38F814ACDFE70DBF19F1E666A84055F39C88F52A9A8BF93A6199BB7396269FD21C0C4A2DB4FC65BD7B3F3DA3A62A36E0304DBA2FCB2309F423544CD87
                  Malicious:false
                  Reputation:low
                  Preview:MDMP..a..... ..........f....................................$...t'.......)..._..........`.......8...........T...........h>..t............'...........)..............................................................................eJ.......*......GenuineIntel............T...........0..f....L........................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):6384
                  Entropy (8bit):3.717767588768132
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJWg6XJ+YZzVapr689boJCsfqupm:R6lXJh6Z+Yn0oJBfTE
                  MD5:88931B628AEB489AD8C495AB58063178
                  SHA1:53CEFDE1885D76F545B97869A31882932F8C05EF
                  SHA-256:F2CA7F0FB8E2E44964FAF4CAEE480B77BA32C53612D48235D2E861343C0E42F2
                  SHA-512:62A6EAE5B537BE4CA153ACD53E5F2D8CF71E83F4540B80DFA3DC574DAE1D18182F3BA9B3DD533614FA2BB817B86EBF645960C81DDAA18DBD6A665D4AC40DEFEA
                  Malicious:false
                  Reputation:low
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.7.5.6.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4729
                  Entropy (8bit):4.448828040781326
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zs5NJg77aI9sfWpW8VYj2Ym8M4JoxFqI+q8vulmLCd:uIjf5nI7OO7VCJUKomLCd
                  MD5:9147A3187C8547ABBF9C751D3C16EF3B
                  SHA1:92C8D631D03EBFBE85BA4328A86E4D8083C14A3B
                  SHA-256:FC05361E079AB959AAE1E0430385FBC124C91F93E86B64C309D5409CF9D2B97B
                  SHA-512:442400464F7968263B24CEA00690E7120265DE9742A66A62FB1AD5AE39EC4DCCFBE58DEBC7FE8F9C07CA385BEA051B2B1B91E0C6F6297B31A396153B51AA01F9
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="515730" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exe
                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):1464832
                  Entropy (8bit):6.886828046222246
                  Encrypted:false
                  SSDEEP:24576:rAonTAWtaG9kwX2t684Bnndby1UuFLan9k5TRM7phylfihgdElWlVjD:rAodtaG9kS2U84B+FLan9k5TRM9zlgVj
                  MD5:CCDC6ABB91CBA9B82FCEA9F02AAEFFAC
                  SHA1:8BADDE3B9CB21B8F6CD0FCF75F8B94A545FA35EA
                  SHA-256:55EAD53E3DFF6DB18AB2E0A9E353C4F39E6D0CE7AD0DD506DD7CE92D866B7EAA
                  SHA-512:216E011F71E2783EC85B21AE98A1952D9C0F8FF7325E7001C177B3FFAEBA5407446E42C05393BB33B6DCFD430EB81323343A24C9F6A2597709A6DF26D0CAF7DF
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 66%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E......E...E...E...D...E...D...E...D/..E..BE...EJ..D...E...E..E...D...E...D...E...E...E...DD..EI..D...EI..D...E................PE..d......f.........."....).n..........,..........@.............................`............`.............................................\...................................P.......Z..T....................]..(....Y..@............................................text............................... ..`.managed(z.......|.................. ..`hydrated.................................rdata..jl.......n...r..............@..@.data...............................@....pdata..............................@..@.rsrc..............................@..@.reloc.......P.......T..............@..B................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.466344412417991
                  Encrypted:false
                  SSDEEP:6144:TIXfpi67eLPU9skLmb0b4OWSPKaJG8nAgejZMMhA2gX4WABl0uNddwBCswSb+:EXD94OWlLZMM6YFH7++
                  MD5:A2791C4437591F26E21ADBDA86022287
                  SHA1:9062DBD6220E38A9B7F80232F3D6A0A59F29B24C
                  SHA-256:F918B0A1D009CF60BA2882873F985900109FAE7F909079E80512291A343E4A7C
                  SHA-512:DE67D87AAEBF79171DF90A365D90CAB5E7BB63CE157A16C02B40322618EF45582C967766F064DF1BAFBE02F35CCC364F8CCE3A6BA171DF7CBACFD7D2E8DF825B
                  Malicious:false
                  Reputation:low
                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.3=OF...............................................................................................................................................................................................................................................................................................................................................r.*{........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                  Entropy (8bit):6.886828046222246
                  TrID:
                  • Win64 Executable GUI (202006/5) 77.37%
                  • InstallShield setup (43055/19) 16.49%
                  • Win64 Executable (generic) (12005/4) 4.60%
                  • Generic Win/DOS Executable (2004/3) 0.77%
                  • DOS Executable Generic (2002/1) 0.77%
                  File name:rPROFORMAINVOICE-PO_ATS_1036.exe
                  File size:1'464'832 bytes
                  MD5:ccdc6abb91cba9b82fcea9f02aaeffac
                  SHA1:8badde3b9cb21b8f6cd0fcf75f8b94a545fa35ea
                  SHA256:55ead53e3dff6db18ab2e0a9e353c4f39e6d0ce7ad0dd506dd7ce92d866b7eaa
                  SHA512:216e011f71e2783ec85b21ae98a1952d9c0f8ff7325e7001c177b3ffaeba5407446e42c05393bb33b6dcfd430eb81323343a24c9f6a2597709a6df26d0caf7df
                  SSDEEP:24576:rAonTAWtaG9kwX2t684Bnndby1UuFLan9k5TRM7phylfihgdElWlVjD:rAodtaG9kS2U84B+FLan9k5TRM9zlgVj
                  TLSH:B765BE19E3A911FCD52BC634CB51A233E6B174560B21A5CB0B99C7452FB3EE16B7B302
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E......E...E...E...D...E...D...E...D/..E..BE...EJ..D...E...E...E...D...E...D...E...E...E...DD..EI..D...EI..D...E...............
                  Icon Hash:90cececece8e8eb0
                  Entrypoint:0x14006ac2c
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x140000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Time Stamp:0x66E5ADB8 [Sat Sep 14 15:37:28 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:22a65106d3d84ea74d966fa0424a5a0c
                  Instruction
                  dec eax
                  sub esp, 28h
                  call 00007FB9B48ABE6Ch
                  dec eax
                  add esp, 28h
                  jmp 00007FB9B48AB697h
                  int3
                  int3
                  jmp 00007FB9B48AC1E8h
                  int3
                  int3
                  int3
                  dec eax
                  sub esp, 28h
                  call 00007FB9B48AC1E4h
                  jmp 00007FB9B48AB824h
                  xor eax, eax
                  dec eax
                  add esp, 28h
                  ret
                  int3
                  int3
                  jmp 00007FB9B48AB80Ch
                  int3
                  int3
                  int3
                  dec eax
                  sub esp, 28h
                  dec ebp
                  mov eax, dword ptr [ecx+38h]
                  dec eax
                  mov ecx, edx
                  dec ecx
                  mov edx, ecx
                  call 00007FB9B48AB832h
                  mov eax, 00000001h
                  dec eax
                  add esp, 28h
                  ret
                  int3
                  int3
                  int3
                  inc eax
                  push ebx
                  inc ebp
                  mov ebx, dword ptr [eax]
                  dec eax
                  mov ebx, edx
                  inc ecx
                  and ebx, FFFFFFF8h
                  dec esp
                  mov ecx, ecx
                  inc ecx
                  test byte ptr [eax], 00000004h
                  dec esp
                  mov edx, ecx
                  je 00007FB9B48AB835h
                  inc ecx
                  mov eax, dword ptr [eax+08h]
                  dec ebp
                  arpl word ptr [eax+04h], dx
                  neg eax
                  dec esp
                  add edx, ecx
                  dec eax
                  arpl ax, cx
                  dec esp
                  and edx, ecx
                  dec ecx
                  arpl bx, ax
                  dec edx
                  mov edx, dword ptr [eax+edx]
                  dec eax
                  mov eax, dword ptr [ebx+10h]
                  mov ecx, dword ptr [eax+08h]
                  dec eax
                  mov eax, dword ptr [ebx+08h]
                  test byte ptr [ecx+eax+03h], 0000000Fh
                  je 00007FB9B48AB82Dh
                  movzx eax, byte ptr [ecx+eax+03h]
                  and eax, FFFFFFF0h
                  dec esp
                  add ecx, eax
                  dec esp
                  xor ecx, edx
                  dec ecx
                  mov ecx, ecx
                  pop ebx
                  jmp 00007FB9B48AB836h
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  nop word ptr [eax+eax+00000000h]
                  dec eax
                  cmp ecx, dword ptr [00000049h]
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x17f3c00x5c.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x17f41c0xf0.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x19c0000x8cec.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x18f0000xcdec.pdata
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a50000x5b8.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x165ae00x54.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x165d000x28.rdata
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1659a00x140.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x11a0000x6a0.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x6f1880x6f20016824105689e93571b28f6d652acf3f1False0.45466728768278963data6.6338226603175485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .managed0x710000x77a280x77c00459fe8e4d0429964edfb07e39e66b232False0.46850331093423797data6.473781869755907IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  hydrated0xe90000x304980x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rdata0x11a0000x66c6a0x66e0066005403fd51b790f6bebcfc93bfd20aFalse0.48810088851761846data6.702713768992107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x1810000xd5a80x18009d5075bd44b367f703d8e922b003398aFalse0.2294921875data3.190641782829915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .pdata0x18f0000xcdec0xce00638451eb673a6cdf25f666b19f1b8bb4False0.49419751213592233data6.064103613023274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0x19c0000x8cec0x8e0044a3fd7e9e9250b96fa62a4cdb150fb0False0.9726287411971831data7.961008846506978IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x1a50000x5b80x600adcf9b9e4d3994d1018ad464f4f1db74False0.5826822916666666data5.215191968056739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  BINARY0x19c1300x8694data1.000609543712992
                  RT_VERSION0x1a47c40x33cdata0.3864734299516908
                  RT_MANIFEST0x1a4b000x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                  DLLImport
                  ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegSetValueExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegEnumValueW
                  bcrypt.dllBCryptCloseAlgorithmProvider, BCryptGenerateSymmetricKey, BCryptDestroyKey, BCryptOpenAlgorithmProvider, BCryptGenRandom
                  KERNEL32.dllTlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, EncodePointer, GetConsoleWindow, FreeConsole, AllocConsole, SetLastError, GetLastError, LocalFree, CloseHandle, ExitProcess, GetTickCount64, FormatMessageW, K32EnumProcessModulesEx, IsWow64Process, GetExitCodeProcess, OpenProcess, K32EnumProcesses, K32GetModuleInformation, K32GetModuleBaseNameW, K32GetModuleFileNameExW, GetProcessId, DuplicateHandle, GetCurrentProcess, CloseThreadpoolIo, GetCurrentProcessId, MultiByteToWideChar, GetStdHandle, RaiseFailFastException, GetCalendarInfoEx, CompareStringOrdinal, CompareStringEx, FindNLSStringEx, GetLocaleInfoEx, ResolveLocaleName, FindStringOrdinal, GetCurrentThread, Sleep, DeleteCriticalSection, EnterCriticalSection, SleepConditionVariableCS, LeaveCriticalSection, WakeConditionVariable, QueryPerformanceCounter, InitializeCriticalSection, InitializeConditionVariable, WaitForMultipleObjectsEx, QueryPerformanceFrequency, GetFullPathNameW, GetLongPathNameW, WideCharToMultiByte, LocalAlloc, GetConsoleOutputCP, GetProcAddress, LocaleNameToLCID, LCMapStringEx, EnumTimeFormatsEx, EnumCalendarInfoExEx, CreateFileW, CreateThreadpoolIo, StartThreadpoolIo, CancelThreadpoolIo, DeleteFileW, DeviceIoControl, ExpandEnvironmentStringsW, FindClose, FindFirstFileExW, FlushFileBuffers, FreeLibrary, GetFileAttributesExW, GetFileInformationByHandleEx, GetFileType, GetModuleFileNameW, GetOverlappedResult, LoadLibraryExW, ReadFile, SetFileInformationByHandle, SetThreadErrorMode, GetThreadPriority, SetThreadPriority, WriteFile, GetCurrentProcessorNumberEx, SetEvent, CreateEventExW, GetEnvironmentVariableW, FlushProcessWriteBuffers, WaitForSingleObjectEx, RtlVirtualUnwind, RtlCaptureContext, RtlRestoreContext, AddVectoredExceptionHandler, FlsAlloc, FlsGetValue, FlsSetValue, CreateEventW, TerminateProcess, SwitchToThread, CreateThread, GetCurrentThreadId, SuspendThread, ResumeThread, GetThreadContext, SetThreadContext, FlushInstructionCache, VirtualAlloc, VirtualProtect, VirtualFree, QueryInformationJobObject, GetModuleHandleW, GetModuleHandleExW, GetProcessAffinityMask, InitializeContext, GetEnabledXStateFeatures, SetXStateFeaturesMask, InitializeCriticalSectionEx, VirtualQuery, GetSystemTimeAsFileTime, ResetEvent, DebugBreak, WaitForSingleObject, SleepEx, GlobalMemoryStatusEx, GetSystemInfo, GetLogicalProcessorInformation, GetLogicalProcessorInformationEx, GetLargePageMinimum, VirtualUnlock, VirtualAllocExNuma, IsProcessInJob, GetNumaHighestNodeNumber, GetProcessGroupAffinity, K32GetProcessMemoryInfo, RaiseException, RtlPcToFileHeader, RtlUnwindEx, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, RtlLookupFunctionEntry, InitializeSListHead
                  ole32.dllCoGetApartmentType, CoTaskMemAlloc, CoUninitialize, CoInitializeEx, CoTaskMemFree, CoWaitForMultipleHandles
                  api-ms-win-crt-heap-l1-1-0.dllmalloc, free, _callnewh, calloc, _set_new_mode
                  api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                  api-ms-win-crt-string-l1-1-0.dllstrcmp, _stricmp, strcpy_s, strncpy_s, wcsncmp
                  api-ms-win-crt-convert-l1-1-0.dllstrtoull
                  api-ms-win-crt-runtime-l1-1-0.dll__p___wargv, _cexit, exit, terminate, _crt_atexit, _register_onexit_function, _initialize_onexit_table, __p___argc, _exit, abort, _initterm_e, _c_exit, _register_thread_local_exe_atexit_callback, _seh_filter_exe, _set_app_type, _initterm, _configure_wide_argv, _initialize_wide_environment, _get_initial_wide_environment
                  api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsprintf_s, __stdio_common_vfprintf, __p__commode, _set_fmode, __stdio_common_vsscanf, __acrt_iob_func
                  api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-09-25T14:26:30.991268+02002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.45814867.215.224.1335454TCP
                  2024-09-25T14:26:58.181877+02002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.45815467.215.224.1335454TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 25, 2024 14:25:24.065973043 CEST49675443192.168.2.4173.222.162.32
                  Sep 25, 2024 14:25:28.083329916 CEST497305454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:28.088262081 CEST54544973067.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:28.088402033 CEST497305454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:28.178103924 CEST497305454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:28.183857918 CEST54544973067.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:29.657665968 CEST54544973067.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:29.657776117 CEST497305454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:31.753740072 CEST497305454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:31.755755901 CEST497315454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:31.758657932 CEST54544973067.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:31.760586977 CEST54544973167.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:31.760701895 CEST497315454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:31.774903059 CEST497315454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:31.779848099 CEST54544973167.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:33.333336115 CEST54544973167.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:33.333420992 CEST497315454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:37.503679991 CEST497315454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:37.504909992 CEST497335454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:37.508531094 CEST54544973167.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:37.509776115 CEST54544973367.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:37.509869099 CEST497335454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:37.528363943 CEST497335454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:37.533220053 CEST54544973367.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:39.080449104 CEST54544973367.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:39.080744028 CEST497335454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:41.449673891 CEST4972380192.168.2.493.184.221.240
                  Sep 25, 2024 14:25:41.454740047 CEST804972393.184.221.240192.168.2.4
                  Sep 25, 2024 14:25:41.455638885 CEST4972380192.168.2.493.184.221.240
                  Sep 25, 2024 14:25:41.941034079 CEST497335454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:41.942063093 CEST497395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:41.946024895 CEST54544973367.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:41.946892023 CEST54544973967.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:41.946970940 CEST497395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:41.963135004 CEST497395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:41.969373941 CEST54544973967.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:43.621519089 CEST54544973967.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:43.621603966 CEST497395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:46.817111015 CEST497395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:46.819411993 CEST497405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:46.847575903 CEST54544973967.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:46.851737976 CEST54544974067.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:46.851867914 CEST497405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:46.866580963 CEST497405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:46.889198065 CEST54544974067.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:48.810291052 CEST54544974067.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:48.810313940 CEST54544974067.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:48.810436964 CEST497405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:50.972501040 CEST497405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:50.974397898 CEST497415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:50.984384060 CEST54544974067.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:50.986604929 CEST54544974167.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:50.986764908 CEST497415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:51.005218029 CEST497415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:51.014213085 CEST54544974167.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:52.615550041 CEST54544974167.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:52.615706921 CEST497415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:53.229340076 CEST5813053192.168.2.4162.159.36.2
                  Sep 25, 2024 14:25:53.244033098 CEST5358130162.159.36.2192.168.2.4
                  Sep 25, 2024 14:25:53.244157076 CEST5813053192.168.2.4162.159.36.2
                  Sep 25, 2024 14:25:53.244318008 CEST5813053192.168.2.4162.159.36.2
                  Sep 25, 2024 14:25:53.253160000 CEST5358130162.159.36.2192.168.2.4
                  Sep 25, 2024 14:25:53.742116928 CEST5358130162.159.36.2192.168.2.4
                  Sep 25, 2024 14:25:53.747014999 CEST5813053192.168.2.4162.159.36.2
                  Sep 25, 2024 14:25:53.770323992 CEST5358130162.159.36.2192.168.2.4
                  Sep 25, 2024 14:25:53.770412922 CEST5813053192.168.2.4162.159.36.2
                  Sep 25, 2024 14:25:55.256213903 CEST497415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:55.257733107 CEST581325454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:55.275494099 CEST54544974167.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:55.275835037 CEST54545813267.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:55.275928020 CEST581325454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:55.309695005 CEST581325454192.168.2.467.215.224.133
                  Sep 25, 2024 14:25:55.318092108 CEST54545813267.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:57.102610111 CEST54545813267.215.224.133192.168.2.4
                  Sep 25, 2024 14:25:57.102737904 CEST581325454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:00.378905058 CEST581325454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:00.379981995 CEST581365454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:00.385278940 CEST54545813267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:00.386301994 CEST54545813667.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:00.386456966 CEST581365454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:00.400599957 CEST581365454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:00.406557083 CEST54545813667.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:02.002873898 CEST54545813667.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:02.004323959 CEST581365454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:04.735771894 CEST581365454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:04.738430023 CEST581375454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:04.741015911 CEST54545813667.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:04.743268013 CEST54545813767.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:04.743407011 CEST581375454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:04.825062990 CEST581375454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:04.832082987 CEST54545813767.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:06.314150095 CEST54545813767.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:06.314321995 CEST581375454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:08.175514936 CEST581375454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:08.176774025 CEST581385454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:08.180438995 CEST54545813767.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:08.181571960 CEST54545813867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:08.181669950 CEST581385454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:08.198577881 CEST581385454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:08.205084085 CEST54545813867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:09.774266005 CEST54545813867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:09.774523973 CEST581385454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:11.847414970 CEST581385454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:11.848463058 CEST581395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:11.853703022 CEST54545813867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:11.854245901 CEST54545813967.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:11.854361057 CEST581395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:11.868599892 CEST581395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:11.874130964 CEST54545813967.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:13.423770905 CEST54545813967.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:13.423935890 CEST581395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:14.691088915 CEST581395454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:14.691900015 CEST581405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:14.695868015 CEST54545813967.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:14.696682930 CEST54545814067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:14.696774960 CEST581405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:14.709603071 CEST581405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:14.714493990 CEST54545814067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:16.291531086 CEST54545814067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:16.291796923 CEST581405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:16.993506908 CEST581405454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:16.995414972 CEST581415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:16.998446941 CEST54545814067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:17.000303984 CEST54545814167.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:17.000408888 CEST581415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:17.015047073 CEST581415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:17.020503998 CEST54545814167.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:18.582076073 CEST54545814167.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:18.582269907 CEST581415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:18.612953901 CEST581415454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:18.613837004 CEST581425454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:18.617872000 CEST54545814167.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:18.618629932 CEST54545814267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:18.618702888 CEST581425454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:18.630337954 CEST581425454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:18.635185003 CEST54545814267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:20.209152937 CEST54545814267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:20.209280968 CEST581425454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:20.253637075 CEST581425454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:20.254601955 CEST581435454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:20.258690119 CEST54545814267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:20.259438038 CEST54545814367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:20.259510994 CEST581435454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:20.275404930 CEST581435454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:20.280431986 CEST54545814367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:21.831409931 CEST54545814367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:21.831787109 CEST581435454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:22.597367048 CEST581435454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:22.598351955 CEST581445454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:22.602257013 CEST54545814367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:22.603224993 CEST54545814467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:22.603303909 CEST581445454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:22.615725994 CEST581445454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:22.620670080 CEST54545814467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:24.193614006 CEST54545814467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:24.193706036 CEST581445454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:24.737910986 CEST581445454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:24.738836050 CEST581455454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:24.742870092 CEST54545814467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:24.743771076 CEST54545814567.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:24.743868113 CEST581455454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:24.755249977 CEST581455454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:24.760010004 CEST54545814567.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:26.334225893 CEST54545814567.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:26.334414005 CEST581455454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:26.628647089 CEST581455454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:26.629576921 CEST581465454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:26.635847092 CEST54545814567.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:26.638817072 CEST54545814667.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:26.638987064 CEST581465454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:26.651000977 CEST581465454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:26.658725023 CEST54545814667.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:28.223449945 CEST54545814667.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:28.223608017 CEST581465454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:28.347368002 CEST581465454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:28.348355055 CEST581475454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:28.352257013 CEST54545814667.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:28.353271008 CEST54545814767.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:28.353348970 CEST581475454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:28.364743948 CEST581475454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:28.369584084 CEST54545814767.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:29.285067081 CEST4972480192.168.2.493.184.221.240
                  Sep 25, 2024 14:26:29.290213108 CEST804972493.184.221.240192.168.2.4
                  Sep 25, 2024 14:26:29.290318966 CEST4972480192.168.2.493.184.221.240
                  Sep 25, 2024 14:26:29.942154884 CEST54545814767.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:29.942270041 CEST581475454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:29.958025932 CEST581475454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:29.960786104 CEST581485454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:29.963066101 CEST54545814767.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:29.965708971 CEST54545814867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:29.965823889 CEST581485454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:29.978579044 CEST581485454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:29.983582020 CEST54545814867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:30.991267920 CEST581485454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:30.997365952 CEST54545814867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:31.019622087 CEST581485454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:31.025746107 CEST54545814867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:31.238322020 CEST581485454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:31.243350983 CEST54545814867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:31.604201078 CEST54545814867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:31.605653048 CEST581485454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:31.606267929 CEST581485454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:31.607856035 CEST581495454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:31.610990047 CEST54545814867.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:31.612750053 CEST54545814967.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:31.612865925 CEST581495454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:31.643135071 CEST581495454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:31.648066998 CEST54545814967.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:33.191458941 CEST54545814967.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:33.192709923 CEST581495454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:36.831597090 CEST581495454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:36.834301949 CEST581505454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:36.836584091 CEST54545814967.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:36.839253902 CEST54545815067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:36.839340925 CEST581505454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:36.876773119 CEST581505454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:36.881786108 CEST54545815067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:37.363272905 CEST581505454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:37.368345022 CEST54545815067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:37.441286087 CEST581505454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:37.446258068 CEST54545815067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:38.409243107 CEST54545815067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:38.409400940 CEST581505454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:42.458300114 CEST581515454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:42.458301067 CEST581505454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:42.464808941 CEST54545815067.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:42.464822054 CEST54545815167.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:42.464945078 CEST581515454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:42.561379910 CEST581515454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:42.566240072 CEST54545815167.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:44.054091930 CEST54545815167.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:44.054164886 CEST581515454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:47.613071918 CEST581515454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:47.615159988 CEST581525454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:47.618063927 CEST54545815167.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:47.620073080 CEST54545815267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:47.620145082 CEST581525454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:47.652051926 CEST581525454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:47.657244921 CEST54545815267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:47.707494020 CEST581525454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:47.754436970 CEST54545815267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:47.816276073 CEST581525454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:47.823379993 CEST54545815267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:49.283936977 CEST54545815267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:49.284056902 CEST581525454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:52.847598076 CEST581525454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:52.849544048 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:52.863617897 CEST54545815267.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:52.864392042 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:52.866596937 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:52.937750101 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:52.942728996 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:53.350121021 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:53.657653093 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:53.691361904 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:53.691378117 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:53.722594023 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:53.740813971 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:53.831291914 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:53.840766907 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:53.923512936 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:53.948157072 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:53.961719990 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:53.970104933 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:54.034586906 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:54.044466019 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:54.046842098 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:54.058393955 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:54.144751072 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:54.154185057 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:54.510936975 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:54.511003971 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:57.987931013 CEST581535454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:57.990403891 CEST581545454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:57.993298054 CEST54545815367.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:57.995368958 CEST54545815467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:57.995465994 CEST581545454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:58.046135902 CEST581545454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:58.051043034 CEST54545815467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:58.152220011 CEST581545454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:58.158212900 CEST54545815467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:58.181876898 CEST581545454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:58.400289059 CEST54545815467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:59.253690958 CEST581545454192.168.2.467.215.224.133
                  Sep 25, 2024 14:26:59.258692026 CEST54545815467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:59.596793890 CEST54545815467.215.224.133192.168.2.4
                  Sep 25, 2024 14:26:59.596863985 CEST581545454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:03.219058990 CEST581545454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:03.224387884 CEST54545815467.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:03.250720024 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:03.269224882 CEST54545815567.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:03.269596100 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:03.454819918 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:03.463280916 CEST54545815567.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:03.553725958 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:03.573621035 CEST54545815567.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:03.727591038 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:03.734019041 CEST54545815567.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:03.842407942 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:03.851066113 CEST54545815567.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:03.855220079 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:03.865318060 CEST54545815567.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:04.637378931 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:04.643294096 CEST54545815567.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:04.919886112 CEST54545815567.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:04.919986010 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:08.659755945 CEST581555454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:08.660895109 CEST581565454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:08.664693117 CEST54545815567.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:08.665834904 CEST54545815667.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:08.665930033 CEST581565454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:08.697635889 CEST581565454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:08.702615976 CEST54545815667.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:09.721616983 CEST581565454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:09.726579905 CEST54545815667.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:10.207618952 CEST581565454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:10.383742094 CEST54545815667.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:10.383819103 CEST581565454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:10.385194063 CEST54545815667.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:10.388837099 CEST54545815667.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:13.973510027 CEST581575454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:13.978543043 CEST54545815767.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:13.981600046 CEST581575454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:14.038613081 CEST581575454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:14.043397903 CEST54545815767.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:15.569825888 CEST54545815767.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:15.569937944 CEST581575454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:19.441677094 CEST581575454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:19.443877935 CEST581585454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:19.449393988 CEST54545815767.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:19.452023983 CEST54545815867.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:19.452131033 CEST581585454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:19.478866100 CEST581585454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:19.483747959 CEST54545815867.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:20.113364935 CEST581585454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:20.118444920 CEST54545815867.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:20.168143988 CEST581585454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:20.173158884 CEST54545815867.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:20.682256937 CEST581585454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:20.687285900 CEST54545815867.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:20.881164074 CEST581585454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:20.890012980 CEST54545815867.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:21.050735950 CEST54545815867.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:21.050952911 CEST581585454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:25.378530025 CEST581585454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:25.379903078 CEST581595454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:25.384263039 CEST54545815867.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:25.387131929 CEST54545815967.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:25.387211084 CEST581595454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:25.434683084 CEST581595454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:25.440674067 CEST54545815967.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:27.180217028 CEST54545815967.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:27.180314064 CEST581595454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:30.910080910 CEST581595454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:30.913213015 CEST581605454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:30.915056944 CEST54545815967.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:30.918118954 CEST54545816067.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:30.918201923 CEST581605454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:30.974839926 CEST581605454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:30.981719971 CEST54545816067.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:31.730832100 CEST581605454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:31.738044977 CEST54545816067.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:32.488166094 CEST54545816067.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:32.488261938 CEST581605454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:36.081624031 CEST581605454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:36.082993031 CEST581615454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:36.090447903 CEST54545816067.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:36.090863943 CEST54545816167.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:36.090943098 CEST581615454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:36.127415895 CEST581615454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:36.135070086 CEST54545816167.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:36.339238882 CEST581615454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:36.344302893 CEST54545816167.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:37.237327099 CEST581615454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:37.242489100 CEST54545816167.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:37.402493954 CEST581615454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:37.407511950 CEST54545816167.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:37.767287016 CEST54545816167.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:37.767431974 CEST581615454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:56.826611996 CEST581615454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:56.829626083 CEST581735454192.168.2.467.215.224.133
                  Sep 25, 2024 14:27:56.996958971 CEST54545816167.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:56.996973038 CEST54545817367.215.224.133192.168.2.4
                  Sep 25, 2024 14:27:56.997036934 CEST581735454192.168.2.467.215.224.133
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 25, 2024 14:25:53.228573084 CEST5357373162.159.36.2192.168.2.4
                  Sep 25, 2024 14:25:53.786108971 CEST6188453192.168.2.41.1.1.1
                  Sep 25, 2024 14:25:53.833808899 CEST53618841.1.1.1192.168.2.4
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Sep 25, 2024 14:25:53.786108971 CEST192.168.2.41.1.1.10x811fStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Sep 25, 2024 14:25:40.356439114 CEST1.1.1.1192.168.2.40xea7dNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                  Sep 25, 2024 14:25:40.356439114 CEST1.1.1.1192.168.2.40xea7dNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                  Sep 25, 2024 14:25:53.833808899 CEST1.1.1.1192.168.2.40x811fName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:08:25:20
                  Start date:25/09/2024
                  Path:C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\rPROFORMAINVOICE-PO_ATS_1036.exe"
                  Imagebase:0x7ff78b950000
                  File size:1'464'832 bytes
                  MD5 hash:CCDC6ABB91CBA9B82FCEA9F02AAEFFAC
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1693833580.000002544BC00000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1694534154.000002544E000000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1694534154.000002544E000000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:08:25:20
                  Start date:25/09/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7699e0000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Target ID:2
                  Start time:08:25:20
                  Start date:25/09/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
                  Imagebase:0x860000
                  File size:262'432 bytes
                  MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000002.3246247886.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000002.00000002.3246247886.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:high
                  Has exited:true

                  Target ID:9
                  Start time:08:27:38
                  Start date:25/09/2024
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 1588
                  Imagebase:0xc30000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:7.2%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:31.5%
                    Total number of Nodes:1152
                    Total number of Limit Nodes:71
                    execution_graph 30556 7ff78b9899c3 52 API calls _swprintf_c_l 30515 7ff78b954ec3 25 API calls 29578 7ff78b96dfbf 29581 7ff78b990720 29578->29581 29586 7ff78b96adf0 29581->29586 29583 7ff78b96df97 29584 7ff78b990758 29584->29583 29597 7ff78b96b250 29584->29597 29587 7ff78b96ae39 29586->29587 29595 7ff78b96af10 29587->29595 29610 7ff78b990570 SwitchToThread SwitchToThread SwitchToThread SwitchToThread 29587->29610 29590 7ff78b96b1e9 29613 7ff78b96b750 VirtualAlloc VirtualUnlock DebugBreak _swprintf_c_l 29590->29613 29591 7ff78b96b1a0 29612 7ff78b9729c0 6 API calls _swprintf_c_l 29591->29612 29592 7ff78b96b122 29592->29590 29592->29591 29595->29584 29596 7ff78b96af49 _swprintf_c_l 29596->29592 29611 7ff78b983410 VirtualAlloc VirtualUnlock _swprintf_c_l 29596->29611 29603 7ff78b96b2d8 29597->29603 29598 7ff78b96b46d 29598->29584 29599 7ff78b96b2dd 29599->29598 29600 7ff78b96b405 29599->29600 29622 7ff78b990570 SwitchToThread SwitchToThread SwitchToThread SwitchToThread 29599->29622 29605 7ff78b96b477 29600->29605 29606 7ff78b96b432 29600->29606 29603->29598 29603->29599 29614 7ff78b97f900 29603->29614 29604 7ff78b96b3da 29604->29600 29623 7ff78b983410 VirtualAlloc VirtualUnlock _swprintf_c_l 29604->29623 29625 7ff78b96b750 VirtualAlloc VirtualUnlock DebugBreak _swprintf_c_l 29605->29625 29624 7ff78b9729c0 6 API calls _swprintf_c_l 29606->29624 29610->29596 29611->29592 29612->29595 29613->29595 29615 7ff78b97f916 29614->29615 29616 7ff78b97f947 29615->29616 29617 7ff78b97f9b0 29615->29617 29618 7ff78b960130 4 API calls 29615->29618 29616->29599 29626 7ff78b992320 29617->29626 29618->29617 29621 7ff78b960130 4 API calls 29621->29616 29622->29604 29623->29600 29624->29598 29625->29598 29627 7ff78b992359 EnterCriticalSection 29626->29627 29628 7ff78b9923e5 29626->29628 29629 7ff78b992379 LeaveCriticalSection 29627->29629 29630 7ff78b9616e0 3 API calls 29628->29630 29632 7ff78b97f9d9 29628->29632 29629->29628 29633 7ff78b992413 29630->29633 29632->29616 29632->29621 29633->29632 29634 7ff78b992424 EnterCriticalSection 29633->29634 29635 7ff78b992443 29634->29635 29636 7ff78b99244a LeaveCriticalSection 29634->29636 29635->29636 29636->29632 30516 7ff78b9932d0 16 API calls 29637 7ff78ba030d0 29638 7ff78ba030e1 29637->29638 29640 7ff78ba030ea 29637->29640 29639 7ff78ba03105 29640->29639 29642 7ff78ba03050 29640->29642 29643 7ff78ba03069 29642->29643 29646 7ff78ba03160 29643->29646 29645 7ff78ba03079 29645->29639 29647 7ff78ba03177 29646->29647 29649 7ff78ba031ea 29646->29649 29651 7ff78ba03220 26 API calls 29647->29651 29649->29645 29650 7ff78ba0318b 29650->29645 29651->29650 29861 7ff78b9608d0 29862 7ff78b9608ea 29861->29862 29863 7ff78b9608f5 29861->29863 29864 7ff78b960922 VirtualAlloc 29863->29864 29869 7ff78b96096e 29863->29869 29865 7ff78b960955 29864->29865 29864->29869 29866 7ff78b9bac48 _swprintf_c_l 3 API calls 29865->29866 29867 7ff78b960966 29866->29867 29868 7ff78b9609c1 VirtualFree 29867->29868 29867->29869 29868->29869 30453 7ff78b9680d0 15 API calls 30519 7ff78b9892ce 63 API calls 2 library calls 30520 7ff78b9e6aa0 98 API calls 29970 7ff78b9556a0 29976 7ff78b952ce0 29970->29976 29972 7ff78b9556b2 29973 7ff78b9556ee SetEvent 29972->29973 29982 7ff78ba03840 29973->29982 29977 7ff78b952d06 29976->29977 29978 7ff78b95b4e0 3 API calls 29977->29978 29981 7ff78b952d24 29977->29981 29979 7ff78b952d1c 29978->29979 29989 7ff78b954930 29979->29989 29981->29972 30001 7ff78b9554e0 29982->30001 29984 7ff78ba03861 30017 7ff78b9f27c0 29984->30017 29987 7ff78ba03866 30022 7ff78b955800 WaitForSingleObjectEx 29987->30022 30023 7ff78b9557d0 SetEvent 29987->30023 29998 7ff78b95b6a0 GetCurrentThreadId 29989->29998 29991 7ff78b95495f 29999 7ff78b95ca20 VirtualQuery 29991->29999 29993 7ff78b9549aa 29994 7ff78b9549bb 29993->29994 29995 7ff78b9549ae RaiseFailFastException 29993->29995 30000 7ff78b95fdd0 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException 29994->30000 29995->29994 29997 7ff78b9549c3 29997->29981 29998->29991 29999->29993 30000->29997 30002 7ff78b955548 30001->30002 30003 7ff78b95550f 30001->30003 30002->29984 30003->30002 30004 7ff78b9555df 30003->30004 30007 7ff78b9555c6 30003->30007 30011 7ff78b9555a7 30003->30011 30012 7ff78b955588 30003->30012 30005 7ff78b9555e6 30004->30005 30006 7ff78b9555ff 30004->30006 30024 7ff78b95b980 GetStdHandle WriteFile 30005->30024 30008 7ff78b95562f 30006->30008 30025 7ff78b955370 GetLastError SetLastError 30006->30025 30009 7ff78b952ce0 9 API calls 30007->30009 30008->29984 30009->30004 30011->30007 30016 7ff78b9555b9 RaiseFailFastException 30011->30016 30015 7ff78b955590 Sleep 30012->30015 30014 7ff78b9555f2 RaiseFailFastException 30014->30006 30015->30011 30015->30015 30016->30007 30026 7ff78b9f2890 30017->30026 30021 7ff78b9f27d4 30021->29987 30022->29987 30023->29987 30024->30014 30027 7ff78b9517fc 85 API calls 30026->30027 30029 7ff78b9f28af 30027->30029 30028 7ff78b9f27cf 30043 7ff78b9517fc 30028->30043 30029->30028 30030 7ff78b9f28db CoInitializeEx 30029->30030 30031 7ff78b9f28f2 30030->30031 30032 7ff78b9f28f6 30031->30032 30033 7ff78b9f2900 30031->30033 30032->30028 30035 7ff78b9f294a 30032->30035 30048 7ff78b951fc0 71 API calls 30032->30048 30033->30028 30047 7ff78b9f2970 85 API calls 30033->30047 30049 7ff78b951fc0 71 API calls 30035->30049 30038 7ff78b9f2956 30040 7ff78b952540 26 API calls 30038->30040 30039 7ff78b9f2937 30041 7ff78b952540 26 API calls 30039->30041 30042 7ff78b9f2969 30040->30042 30041->30035 30044 7ff78b951812 30043->30044 30044->30021 30046 7ff78ba0736d 30044->30046 30050 7ff78ba0d620 85 API calls 30044->30050 30046->30021 30047->30028 30048->30039 30049->30038 30050->30046 30487 7ff78b953fa0 28 API calls _swprintf_c_l 30489 7ff78b98a7b0 39 API calls 30560 7ff78b9e31b0 91 API calls 30304 7ff78b9e8fb0 30305 7ff78b9e8fea 30304->30305 30306 7ff78b9e9017 GetLocaleInfoEx 30305->30306 30307 7ff78b9e9036 30306->30307 30309 7ff78b9e9048 30307->30309 30310 7ff78b9d40f0 85 API calls 30307->30310 30310->30309 30311 7ff78b97c9b6 30312 7ff78b97c9bf 30311->30312 30315 7ff78b97c9da ISource 30311->30315 30313 7ff78b990c30 QueryPerformanceCounter 30312->30313 30314 7ff78b97c9ce 30313->30314 30316 7ff78b97d127 30314->30316 30403 7ff78b96bdb0 46 API calls 30314->30403 30317 7ff78b97ca3e 30315->30317 30398 7ff78b9767f0 VirtualFree 30315->30398 30355 7ff78b98adb0 30317->30355 30323 7ff78b97cab5 30367 7ff78b97dfd0 30323->30367 30325 7ff78b97cad4 30382 7ff78b982370 30325->30382 30326 7ff78b97ca48 _swprintf_c_l 30326->30323 30399 7ff78b98d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30326->30399 30328 7ff78b97caff 30330 7ff78b960130 4 API calls 30328->30330 30331 7ff78b97cb25 30328->30331 30330->30331 30332 7ff78b97a330 13 API calls 30331->30332 30333 7ff78b97cc04 30332->30333 30334 7ff78b977e30 4 API calls 30333->30334 30336 7ff78b97cc10 30334->30336 30335 7ff78b97cc2b 30337 7ff78b97cc3d EnterCriticalSection 30335->30337 30351 7ff78b97d0c5 30335->30351 30336->30335 30400 7ff78b991200 28 API calls _swprintf_c_l 30336->30400 30339 7ff78b97cd1e LeaveCriticalSection 30337->30339 30340 7ff78b97ccbd 30337->30340 30349 7ff78b97cd03 30339->30349 30340->30339 30386 7ff78b95bc10 30340->30386 30341 7ff78b97d0cc GetTickCount64 30341->30314 30343 7ff78b97ccdf 30343->30339 30344 7ff78b97ccec LeaveCriticalSection 30343->30344 30344->30349 30345 7ff78b97cf64 30345->30341 30347 7ff78b97d05c 30345->30347 30345->30351 30346 7ff78b97cf19 30346->30345 30401 7ff78b979980 QueryPerformanceCounter ResetEvent SetEvent WaitForSingleObject 30346->30401 30402 7ff78b979980 QueryPerformanceCounter ResetEvent SetEvent WaitForSingleObject 30347->30402 30348 7ff78b974020 7 API calls 30348->30349 30349->30345 30349->30348 30352 7ff78b97ce69 30349->30352 30351->30341 30352->30346 30353 7ff78b97a330 13 API calls 30352->30353 30353->30346 30357 7ff78b98adc2 _swprintf_c_l 30355->30357 30358 7ff78b97ca43 30355->30358 30357->30358 30404 7ff78b98d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30357->30404 30359 7ff78b96e5f0 30358->30359 30361 7ff78b96e614 _swprintf_c_l 30359->30361 30360 7ff78b96e6e0 _swprintf_c_l 30363 7ff78b96e7d0 30360->30363 30407 7ff78b98d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30360->30407 30408 7ff78b990e70 DebugBreak DebugBreak DebugBreak DebugBreak 30360->30408 30361->30360 30405 7ff78b98d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30361->30405 30406 7ff78b990e70 DebugBreak DebugBreak DebugBreak DebugBreak 30361->30406 30363->30326 30368 7ff78b97e084 30367->30368 30370 7ff78b97e1ea 30368->30370 30409 7ff78b961630 QueryPerformanceCounter 30368->30409 30378 7ff78b97e38d 30370->30378 30410 7ff78b96d390 24 API calls 30370->30410 30372 7ff78b97e356 30373 7ff78b97e414 30372->30373 30372->30378 30411 7ff78b974120 7 API calls 30372->30411 30412 7ff78b98d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30373->30412 30376 7ff78b960e30 10 API calls 30381 7ff78b97e408 30376->30381 30377 7ff78b97e378 30377->30373 30379 7ff78b97e380 30377->30379 30378->30376 30378->30381 30380 7ff78b977a30 5 API calls 30379->30380 30380->30378 30381->30325 30383 7ff78b9823ad 30382->30383 30385 7ff78b9823d7 30382->30385 30384 7ff78b960e30 10 API calls 30383->30384 30384->30385 30385->30328 30387 7ff78b95bc2f 30386->30387 30388 7ff78b95bc52 30387->30388 30413 7ff78b95ba40 CreateThread 30387->30413 30388->30343 30390 7ff78b95bc44 30391 7ff78b95bc4d 30390->30391 30392 7ff78b95bc59 30390->30392 30416 7ff78b9606a0 CloseHandle 30391->30416 30417 7ff78b960780 WaitForMultipleObjectsEx SetLastError CoWaitForMultipleHandles SetLastError 30392->30417 30395 7ff78b95bc69 30418 7ff78b9606a0 CloseHandle 30395->30418 30397 7ff78b95bc73 30397->30343 30398->30317 30399->30326 30400->30335 30403->30316 30404->30357 30405->30361 30406->30361 30407->30360 30408->30360 30409->30370 30410->30372 30411->30377 30412->30378 30414 7ff78b95ba69 CloseHandle 30413->30414 30415 7ff78b95ba64 30413->30415 30414->30390 30415->30390 30416->30388 30417->30395 30418->30397 30456 7ff78b96dcb5 6 API calls 30490 7ff78b966fb0 WaitForSingleObject 30447 7ff78b9518b2 30448 7ff78ba07360 30447->30448 30449 7ff78b9518c8 30447->30449 30448->30449 30451 7ff78ba0d620 85 API calls 30448->30451 30451->30449 30524 7ff78b9682b0 SleepEx SwitchToThread SwitchToThread 30562 7ff78b9e3a00 96 API calls 30564 7ff78b951a08 85 API calls 30458 7ff78ba0f100 88 API calls 30459 7ff78b966910 15 API calls 2 library calls 30460 7ff78b967910 SetEvent 30493 7ff78b96df97 18 API calls 30528 7ff78b96ab10 DebugBreak DebugBreak 30461 7ff78b974cd9 VirtualAlloc VirtualUnlock _swprintf_c_l 30462 7ff78b987c37 50 API calls ISource 30463 7ff78b96d8d0 59 API calls 30530 7ff78b9642e0 GetCurrentThreadId SleepEx malloc RtlPcToFileHeader RaiseException 30495 7ff78b9553e0 WaitForMultipleObjectsEx SetLastError CoWaitForMultipleHandles SetLastError 30466 7ff78b96df50 45 API calls 30566 7ff78b96d9ea SleepEx WaitForSingleObject SwitchToThread SwitchToThread 30496 7ff78ba0fbe0 LocaleNameToLCID 29068 7ff78b954740 29098 7ff78b95b820 FlsAlloc 29068->29098 29070 7ff78b9548e4 29071 7ff78b95474f 29071->29070 29111 7ff78b95b6c0 GetModuleHandleExW 29071->29111 29073 7ff78b954778 29112 7ff78b955ad0 29073->29112 29075 7ff78b954780 29075->29070 29120 7ff78b95cb30 29075->29120 29079 7ff78b9547b1 29079->29070 29080 7ff78b9547e7 29079->29080 29150 7ff78b95ced0 29079->29150 29082 7ff78b954822 29080->29082 29083 7ff78b95ced0 8 API calls 29080->29083 29084 7ff78b954879 29082->29084 29129 7ff78b960030 29082->29129 29083->29082 29137 7ff78b95c3c0 29084->29137 29087 7ff78b95487e 29087->29070 29153 7ff78b960470 GetEnabledXStateFeatures GetEnabledXStateFeatures 29087->29153 29089 7ff78b954896 29090 7ff78b9548aa 29089->29090 29091 7ff78b9548c3 29089->29091 29154 7ff78b95b980 GetStdHandle WriteFile 29090->29154 29155 7ff78b95c8a0 29091->29155 29094 7ff78b9548b6 RaiseFailFastException 29094->29091 29099 7ff78b95b96e 29098->29099 29100 7ff78b95b840 29098->29100 29099->29071 29157 7ff78b962750 29100->29157 29104 7ff78b95b84a 29104->29099 29105 7ff78b95ced0 8 API calls 29104->29105 29106 7ff78b95b872 29105->29106 29107 7ff78b95b89d GetCurrentProcess GetProcessAffinityMask 29106->29107 29108 7ff78b95b894 29106->29108 29110 7ff78b95b908 29106->29110 29107->29108 29109 7ff78b95b8e4 QueryInformationJobObject 29108->29109 29109->29110 29110->29071 29111->29073 29332 7ff78b9bac48 29112->29332 29115 7ff78b955b24 29115->29075 29117 7ff78b955af2 29117->29115 29118 7ff78b95c8a0 InitializeCriticalSectionEx 29117->29118 29119 7ff78b955b1d 29118->29119 29119->29075 29121 7ff78b95c8a0 InitializeCriticalSectionEx 29120->29121 29122 7ff78b9547a1 29121->29122 29122->29070 29123 7ff78b9540a0 29122->29123 29124 7ff78b9bac48 _swprintf_c_l 3 API calls 29123->29124 29125 7ff78b9540be 29124->29125 29126 7ff78b95415a 29125->29126 29347 7ff78b952e10 4 API calls 2 library calls 29125->29347 29126->29079 29128 7ff78b9540f0 ISource 29128->29079 29130 7ff78b96005b 29129->29130 29136 7ff78b960106 29129->29136 29131 7ff78b9bac48 _swprintf_c_l 3 API calls 29130->29131 29132 7ff78b96007a 29131->29132 29133 7ff78b95c8a0 InitializeCriticalSectionEx 29132->29133 29134 7ff78b9600a5 29133->29134 29135 7ff78b9600ee GetSystemTimeAsFileTime 29134->29135 29135->29136 29136->29084 29138 7ff78b95c40c 29137->29138 29141 7ff78b95c406 29137->29141 29139 7ff78b95ced0 8 API calls 29138->29139 29139->29141 29348 7ff78b95c830 29141->29348 29143 7ff78b95c483 29143->29087 29144 7ff78b95c45f 29144->29143 29371 7ff78b955720 29144->29371 29146 7ff78b95c468 29146->29143 29378 7ff78b95daf0 29146->29378 29147 7ff78b95c478 29147->29087 29577 7ff78b95d0e0 8 API calls 29150->29577 29152 7ff78b95cef8 29152->29080 29153->29089 29154->29094 29156 7ff78b9ba952 InitializeCriticalSectionEx 29155->29156 29303 7ff78b95c0d0 29157->29303 29159 7ff78b96276e 29160 7ff78b95c0d0 8 API calls 29159->29160 29161 7ff78b96279b 29160->29161 29162 7ff78b95c0d0 8 API calls 29161->29162 29163 7ff78b9627c3 29162->29163 29164 7ff78b95c0d0 8 API calls 29163->29164 29165 7ff78b9627eb 29164->29165 29166 7ff78b95c0d0 8 API calls 29165->29166 29167 7ff78b962818 29166->29167 29168 7ff78b95c0d0 8 API calls 29167->29168 29169 7ff78b962840 29168->29169 29170 7ff78b95c0d0 8 API calls 29169->29170 29171 7ff78b96286d 29170->29171 29172 7ff78b95c0d0 8 API calls 29171->29172 29173 7ff78b962895 29172->29173 29174 7ff78b95c0d0 8 API calls 29173->29174 29175 7ff78b9628bd 29174->29175 29176 7ff78b95c0d0 8 API calls 29175->29176 29177 7ff78b9628e5 29176->29177 29178 7ff78b95c0d0 8 API calls 29177->29178 29179 7ff78b962912 29178->29179 29180 7ff78b95c0d0 8 API calls 29179->29180 29181 7ff78b96293f 29180->29181 29308 7ff78b95c1a0 29181->29308 29184 7ff78b95c1a0 18 API calls 29185 7ff78b962990 29184->29185 29186 7ff78b95c1a0 18 API calls 29185->29186 29187 7ff78b9629b9 29186->29187 29188 7ff78b95c1a0 18 API calls 29187->29188 29189 7ff78b9629e2 29188->29189 29190 7ff78b95c1a0 18 API calls 29189->29190 29191 7ff78b962a0b 29190->29191 29192 7ff78b95c1a0 18 API calls 29191->29192 29193 7ff78b962a39 29192->29193 29194 7ff78b95c1a0 18 API calls 29193->29194 29195 7ff78b962a67 29194->29195 29196 7ff78b95c1a0 18 API calls 29195->29196 29197 7ff78b962a90 29196->29197 29198 7ff78b95c1a0 18 API calls 29197->29198 29199 7ff78b962ab9 29198->29199 29200 7ff78b95c1a0 18 API calls 29199->29200 29201 7ff78b962ae2 29200->29201 29202 7ff78b95c1a0 18 API calls 29201->29202 29203 7ff78b962b0b 29202->29203 29204 7ff78b95c1a0 18 API calls 29203->29204 29205 7ff78b962b34 29204->29205 29206 7ff78b95c1a0 18 API calls 29205->29206 29207 7ff78b962b5d 29206->29207 29208 7ff78b95c1a0 18 API calls 29207->29208 29209 7ff78b962b8b 29208->29209 29210 7ff78b95c1a0 18 API calls 29209->29210 29211 7ff78b962bb9 29210->29211 29212 7ff78b95c1a0 18 API calls 29211->29212 29213 7ff78b962be2 29212->29213 29214 7ff78b95c1a0 18 API calls 29213->29214 29215 7ff78b962c0b 29214->29215 29216 7ff78b95c1a0 18 API calls 29215->29216 29217 7ff78b962c34 29216->29217 29218 7ff78b95c1a0 18 API calls 29217->29218 29219 7ff78b962c5d 29218->29219 29220 7ff78b95c1a0 18 API calls 29219->29220 29221 7ff78b962c8b 29220->29221 29222 7ff78b95c1a0 18 API calls 29221->29222 29223 7ff78b962cb9 29222->29223 29224 7ff78b95c1a0 18 API calls 29223->29224 29225 7ff78b962ce2 29224->29225 29226 7ff78b95c1a0 18 API calls 29225->29226 29227 7ff78b962d0b 29226->29227 29228 7ff78b95c1a0 18 API calls 29227->29228 29229 7ff78b962d34 29228->29229 29230 7ff78b95c1a0 18 API calls 29229->29230 29231 7ff78b962d5d 29230->29231 29232 7ff78b95c1a0 18 API calls 29231->29232 29233 7ff78b962d86 29232->29233 29234 7ff78b95c1a0 18 API calls 29233->29234 29235 7ff78b962daf 29234->29235 29236 7ff78b95c1a0 18 API calls 29235->29236 29237 7ff78b962dd8 29236->29237 29238 7ff78b95c1a0 18 API calls 29237->29238 29239 7ff78b962e01 29238->29239 29240 7ff78b95c1a0 18 API calls 29239->29240 29241 7ff78b962e2a 29240->29241 29242 7ff78b95c1a0 18 API calls 29241->29242 29243 7ff78b962e53 29242->29243 29244 7ff78b95c1a0 18 API calls 29243->29244 29245 7ff78b962e7c 29244->29245 29246 7ff78b95c1a0 18 API calls 29245->29246 29247 7ff78b962ea5 29246->29247 29248 7ff78b95c1a0 18 API calls 29247->29248 29249 7ff78b962ece 29248->29249 29250 7ff78b95c1a0 18 API calls 29249->29250 29251 7ff78b962ef7 29250->29251 29252 7ff78b95c1a0 18 API calls 29251->29252 29253 7ff78b962f20 29252->29253 29254 7ff78b95c1a0 18 API calls 29253->29254 29255 7ff78b962f49 29254->29255 29256 7ff78b95c1a0 18 API calls 29255->29256 29257 7ff78b962f72 29256->29257 29258 7ff78b95c1a0 18 API calls 29257->29258 29259 7ff78b962f9b 29258->29259 29260 7ff78b95c1a0 18 API calls 29259->29260 29261 7ff78b962fc4 29260->29261 29262 7ff78b95c1a0 18 API calls 29261->29262 29263 7ff78b962fed 29262->29263 29264 7ff78b95c1a0 18 API calls 29263->29264 29265 7ff78b963016 29264->29265 29266 7ff78b95c1a0 18 API calls 29265->29266 29267 7ff78b96303f 29266->29267 29268 7ff78b95c1a0 18 API calls 29267->29268 29269 7ff78b963068 29268->29269 29270 7ff78b95c1a0 18 API calls 29269->29270 29271 7ff78b963096 29270->29271 29272 7ff78b95c1a0 18 API calls 29271->29272 29273 7ff78b9630c4 29272->29273 29274 7ff78b95c1a0 18 API calls 29273->29274 29275 7ff78b9630f2 29274->29275 29276 7ff78b95c1a0 18 API calls 29275->29276 29277 7ff78b963120 29276->29277 29278 7ff78b95c1a0 18 API calls 29277->29278 29279 7ff78b96314e 29278->29279 29280 7ff78b95c1a0 18 API calls 29279->29280 29281 7ff78b96317c 29280->29281 29282 7ff78b95c1a0 18 API calls 29281->29282 29283 7ff78b9631a5 29282->29283 29284 7ff78b95c1a0 18 API calls 29283->29284 29285 7ff78b9631d3 29284->29285 29286 7ff78b95c1a0 18 API calls 29285->29286 29287 7ff78b9631fc 29286->29287 29288 7ff78b95c1a0 18 API calls 29287->29288 29289 7ff78b963225 29288->29289 29290 7ff78b95c1a0 18 API calls 29289->29290 29291 7ff78b95b845 29290->29291 29292 7ff78b961460 GetSystemInfo 29291->29292 29293 7ff78b9614a4 29292->29293 29294 7ff78b9614ce GetCurrentProcess GetProcessGroupAffinity 29293->29294 29295 7ff78b9614a8 GetNumaHighestNodeNumber 29293->29295 29297 7ff78b9614f9 GetLastError 29294->29297 29298 7ff78b961504 29294->29298 29295->29294 29296 7ff78b9614b7 29295->29296 29296->29294 29297->29298 29301 7ff78b961526 29298->29301 29331 7ff78b961240 GetLogicalProcessorInformationEx GetLastError GetLogicalProcessorInformationEx ISource 29298->29331 29300 7ff78b961590 GetCurrentProcess GetProcessAffinityMask 29302 7ff78b961546 29300->29302 29301->29300 29301->29302 29302->29104 29302->29302 29304 7ff78b95c0f4 29303->29304 29305 7ff78b95c0f8 29304->29305 29306 7ff78b95ced0 8 API calls 29304->29306 29305->29159 29307 7ff78b95c124 29306->29307 29307->29159 29309 7ff78b95c1ca 29308->29309 29310 7ff78b95c2df 29308->29310 29311 7ff78b95c1d7 strcmp 29309->29311 29312 7ff78b95c1ef 29309->29312 29313 7ff78b95ced0 8 API calls 29310->29313 29311->29312 29314 7ff78b95c1e7 29311->29314 29315 7ff78b95c1fc strcmp 29312->29315 29316 7ff78b95c20f 29312->29316 29319 7ff78b95c2f6 29313->29319 29314->29184 29315->29314 29315->29316 29317 7ff78b95c21c strcmp 29316->29317 29318 7ff78b95c22f 29316->29318 29317->29314 29317->29318 29320 7ff78b95c23c strcmp 29318->29320 29321 7ff78b95c24f 29318->29321 29319->29314 29330 7ff78b95d050 _stricmp strtoull 29319->29330 29320->29314 29320->29321 29323 7ff78b95c25c strcmp 29321->29323 29324 7ff78b95c273 29321->29324 29323->29314 29323->29324 29325 7ff78b95c297 29324->29325 29326 7ff78b95c280 strcmp 29324->29326 29327 7ff78b95c2bb 29325->29327 29328 7ff78b95c2a4 strcmp 29325->29328 29326->29314 29326->29325 29327->29310 29329 7ff78b95c2c8 strcmp 29327->29329 29328->29314 29328->29327 29329->29310 29329->29314 29330->29314 29331->29301 29336 7ff78b9bb610 29332->29336 29335 7ff78b960860 InitializeCriticalSectionEx 29335->29117 29337 7ff78b9bb62a malloc 29336->29337 29338 7ff78b955ae5 29337->29338 29339 7ff78b9bb61b 29337->29339 29338->29115 29338->29335 29339->29337 29340 7ff78b9bb63a 29339->29340 29341 7ff78b9bb645 29340->29341 29345 7ff78b9bb924 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 29340->29345 29346 7ff78b9bb944 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 29341->29346 29344 7ff78b9bb64b 29346->29344 29347->29128 29385 7ff78b963d70 29348->29385 29350 7ff78b95c44b 29350->29143 29351 7ff78b969340 29350->29351 29394 7ff78b960130 29351->29394 29355 7ff78b96935a 29358 7ff78b9693fc 29355->29358 29401 7ff78b961010 29355->29401 29357 7ff78b969442 29357->29144 29358->29357 29360 7ff78b9694e9 29358->29360 29439 7ff78b961200 9 API calls 29358->29439 29370 7ff78b969598 ISource 29360->29370 29415 7ff78b981560 29360->29415 29361 7ff78b969527 29361->29360 29440 7ff78b961200 9 API calls 29361->29440 29364 7ff78b969634 29365 7ff78b9bac48 _swprintf_c_l 3 API calls 29364->29365 29364->29370 29366 7ff78b96969a 29365->29366 29366->29370 29441 7ff78b960c50 29366->29441 29368 7ff78b9696bd 29368->29370 29446 7ff78b97fdd0 16 API calls _swprintf_c_l 29368->29446 29370->29144 29372 7ff78b955732 29371->29372 29373 7ff78b95576d 29372->29373 29557 7ff78b960700 CreateEventW 29372->29557 29373->29146 29375 7ff78b955744 29375->29373 29558 7ff78b95ba80 CreateThread 29375->29558 29377 7ff78b955763 29377->29146 29379 7ff78b95db07 29378->29379 29380 7ff78b95db0f 29379->29380 29381 7ff78b9bac48 _swprintf_c_l 3 API calls 29379->29381 29380->29147 29383 7ff78b95db41 29381->29383 29384 7ff78b95dbd5 ISource 29383->29384 29561 7ff78b9641d0 29383->29561 29384->29147 29390 7ff78b964aa0 29385->29390 29388 7ff78b963daf 29388->29350 29391 7ff78b9bac48 _swprintf_c_l 3 API calls 29390->29391 29392 7ff78b963d98 29391->29392 29392->29388 29393 7ff78b9665d0 malloc RtlPcToFileHeader RaiseException _swprintf_c_l 29392->29393 29393->29388 29395 7ff78b9601dc 29394->29395 29396 7ff78b96016b 29394->29396 29400 7ff78b961650 QueryPerformanceFrequency 29395->29400 29396->29395 29399 7ff78b9601a4 29396->29399 29447 7ff78b95fe50 4 API calls 2 library calls 29396->29447 29399->29395 29448 7ff78b9601f0 malloc RtlPcToFileHeader RaiseException _swprintf_c_l 29399->29448 29400->29355 29402 7ff78b961048 GetCurrentProcess IsProcessInJob 29401->29402 29403 7ff78b961045 29401->29403 29404 7ff78b961079 29402->29404 29405 7ff78b961120 29402->29405 29403->29402 29404->29405 29406 7ff78b961083 QueryInformationJobObject 29404->29406 29407 7ff78b961159 29405->29407 29408 7ff78b961130 GlobalMemoryStatusEx 29405->29408 29406->29405 29413 7ff78b9610a5 29406->29413 29409 7ff78b96116c 29407->29409 29410 7ff78b961179 GlobalMemoryStatusEx 29407->29410 29408->29407 29449 7ff78b9bacf0 8 API calls 2 library calls 29409->29449 29410->29409 29411 7ff78b9610e9 GlobalMemoryStatusEx 29411->29405 29413->29405 29413->29411 29414 7ff78b9611bb 29414->29358 29416 7ff78b98157d 29415->29416 29450 7ff78b9616a0 VirtualAlloc 29416->29450 29418 7ff78b9815a3 29419 7ff78b9815f6 29418->29419 29527 7ff78b961440 InitializeCriticalSection 29418->29527 29453 7ff78b961440 InitializeCriticalSection 29419->29453 29422 7ff78b981602 29423 7ff78b981a28 29422->29423 29454 7ff78b992260 29422->29454 29423->29364 29425 7ff78b981631 _swprintf_c_l 29438 7ff78b98186f 29425->29438 29464 7ff78b981260 29425->29464 29427 7ff78b981804 29468 7ff78b9617b0 29427->29468 29429 7ff78b98183e 29429->29438 29471 7ff78b981a50 29429->29471 29431 7ff78b981860 29432 7ff78b981864 29431->29432 29434 7ff78b981893 29431->29434 29528 7ff78b961790 VirtualFree 29432->29528 29434->29438 29489 7ff78b994e60 29434->29489 29438->29364 29439->29361 29440->29360 29442 7ff78b9bac48 _swprintf_c_l 3 API calls 29441->29442 29443 7ff78b960c76 29442->29443 29444 7ff78b960c7e CreateEventW 29443->29444 29445 7ff78b960ca0 ISource 29443->29445 29444->29445 29445->29368 29446->29370 29447->29399 29448->29395 29449->29414 29451 7ff78b9616d9 29450->29451 29452 7ff78b9616c1 VirtualFree 29450->29452 29451->29418 29452->29418 29453->29422 29455 7ff78b99228f 29454->29455 29456 7ff78b9922b2 29455->29456 29457 7ff78b9922bc 29455->29457 29462 7ff78b9922e7 29455->29462 29529 7ff78b961830 18 API calls 29456->29529 29459 7ff78b9617b0 3 API calls 29457->29459 29461 7ff78b9922cd 29459->29461 29460 7ff78b9922ba 29460->29461 29461->29462 29530 7ff78b961790 VirtualFree 29461->29530 29462->29425 29466 7ff78b98127f 29464->29466 29467 7ff78b98129c 29466->29467 29531 7ff78b960d10 GetLogicalProcessorInformation GetLastError GetLogicalProcessorInformation ISource 29466->29531 29467->29427 29469 7ff78b9617f4 GetCurrentProcess VirtualAllocExNuma 29468->29469 29470 7ff78b9617d5 VirtualAlloc 29468->29470 29469->29429 29470->29469 29472 7ff78b981a85 29471->29472 29473 7ff78b981a89 29472->29473 29478 7ff78b981aa3 29472->29478 29532 7ff78b9bacf0 8 API calls 2 library calls 29473->29532 29475 7ff78b981a9b 29475->29431 29476 7ff78b981ae3 EnterCriticalSection 29477 7ff78b981b10 LeaveCriticalSection 29476->29477 29476->29478 29477->29478 29478->29476 29478->29477 29480 7ff78b981c19 LeaveCriticalSection 29478->29480 29482 7ff78b981bef 29478->29482 29485 7ff78b981b61 29478->29485 29533 7ff78b9616e0 29478->29533 29486 7ff78b981c25 29480->29486 29484 7ff78b981bf8 EnterCriticalSection 29482->29484 29482->29486 29483 7ff78b981be7 29483->29431 29484->29480 29536 7ff78b9bacf0 8 API calls 2 library calls 29485->29536 29486->29485 29488 7ff78b981c5d EnterCriticalSection LeaveCriticalSection 29486->29488 29537 7ff78b961770 VirtualFree 29486->29537 29488->29486 29538 7ff78b994da0 29489->29538 29492 7ff78b980c50 29495 7ff78b980c75 29492->29495 29493 7ff78b981225 29554 7ff78b960bb0 CloseHandle 29493->29554 29494 7ff78b981231 29497 7ff78b98123a 29494->29497 29498 7ff78b981246 29494->29498 29500 7ff78b960c50 4 API calls 29495->29500 29525 7ff78b980cdb 29495->29525 29555 7ff78b960bb0 CloseHandle 29497->29555 29498->29438 29501 7ff78b980d1b 29500->29501 29502 7ff78b960c50 4 API calls 29501->29502 29501->29525 29503 7ff78b980d31 _swprintf_c_l 29502->29503 29503->29525 29542 7ff78b960e30 29503->29542 29505 7ff78b981050 29506 7ff78b960c50 4 API calls 29505->29506 29507 7ff78b9810cd 29506->29507 29508 7ff78b98110f 29507->29508 29509 7ff78b960c50 4 API calls 29507->29509 29510 7ff78b9811dd 29508->29510 29511 7ff78b9811d1 29508->29511 29508->29525 29512 7ff78b9810e3 29509->29512 29514 7ff78b9811e6 29510->29514 29515 7ff78b9811f2 29510->29515 29550 7ff78b960bb0 CloseHandle 29511->29550 29512->29508 29549 7ff78b960bd0 4 API calls 2 library calls 29512->29549 29551 7ff78b960bb0 CloseHandle 29514->29551 29516 7ff78b9811fb 29515->29516 29517 7ff78b981207 29515->29517 29552 7ff78b960bb0 CloseHandle 29516->29552 29520 7ff78b981210 29517->29520 29517->29525 29553 7ff78b960bb0 CloseHandle 29520->29553 29523 7ff78b9810f9 29523->29508 29524 7ff78b960c50 4 API calls 29523->29524 29524->29508 29525->29493 29525->29494 29526 7ff78b9811ae 29525->29526 29526->29438 29527->29419 29528->29438 29529->29460 29530->29462 29531->29467 29532->29475 29534 7ff78b9616fb VirtualAlloc 29533->29534 29535 7ff78b96171e GetCurrentProcess VirtualAllocExNuma 29533->29535 29534->29478 29535->29478 29536->29483 29537->29486 29539 7ff78b994db9 29538->29539 29541 7ff78b981a07 29538->29541 29540 7ff78b994dd0 GetEnabledXStateFeatures 29539->29540 29539->29541 29540->29541 29541->29492 29543 7ff78b960e67 GetCurrentProcess 29542->29543 29544 7ff78b960f1f GlobalMemoryStatusEx 29542->29544 29545 7ff78b960e80 29543->29545 29546 7ff78b960e88 29544->29546 29545->29544 29545->29546 29556 7ff78b9bacf0 8 API calls 2 library calls 29546->29556 29548 7ff78b960ff8 29548->29505 29549->29523 29550->29510 29551->29515 29552->29517 29553->29525 29554->29494 29555->29498 29556->29548 29557->29375 29559 7ff78b95bab5 SetThreadPriority ResumeThread CloseHandle 29558->29559 29560 7ff78b95baaf 29558->29560 29559->29377 29560->29377 29562 7ff78b964203 _swprintf_c_l 29561->29562 29566 7ff78b964229 ISource _swprintf_c_l 29562->29566 29567 7ff78b965180 29562->29567 29564 7ff78b964220 29565 7ff78b95c8a0 InitializeCriticalSectionEx 29564->29565 29564->29566 29565->29566 29566->29383 29566->29566 29568 7ff78b9617b0 3 API calls 29567->29568 29569 7ff78b9651a2 29568->29569 29570 7ff78b9651aa 29569->29570 29571 7ff78b9616e0 3 API calls 29569->29571 29570->29564 29572 7ff78b9651c8 29571->29572 29575 7ff78b9651d3 _swprintf_c_l 29572->29575 29576 7ff78b961790 VirtualFree 29572->29576 29574 7ff78b9652ee 29574->29564 29575->29564 29576->29574 29577->29152 30568 7ff78b953540 6 API calls 30500 7ff78b993f50 9 API calls 29652 7ff78ba0ad40 29663 7ff78ba0ad94 29652->29663 29654 7ff78ba0ae21 29681 7ff78ba17ba0 86 API calls 29654->29681 29655 7ff78ba0aebb 29656 7ff78ba0b2f4 29655->29656 29660 7ff78ba0b2db 29655->29660 29657 7ff78b951fc0 71 API calls 29657->29663 29682 7ff78ba17ba0 86 API calls 29660->29682 29662 7ff78b952540 26 API calls 29662->29663 29663->29654 29663->29655 29663->29657 29663->29662 29664 7ff78ba12ed0 86 API calls 29663->29664 29665 7ff78ba17940 29663->29665 29664->29663 29672 7ff78ba17b4f 29665->29672 29680 7ff78ba17967 29665->29680 29666 7ff78ba17af5 29668 7ff78ba17af9 29666->29668 29669 7ff78ba17ac7 29666->29669 29666->29672 29667 7ff78ba179ba 29667->29663 29668->29663 29670 7ff78ba17b3e 29669->29670 29671 7ff78ba17b21 29669->29671 29678 7ff78ba17ad3 29669->29678 29707 7ff78b9520e0 29670->29707 29683 7ff78ba270f0 29671->29683 29715 7ff78ba0f9a0 85 API calls 29672->29715 29675 7ff78ba17b2a 29675->29663 29677 7ff78ba17b81 29678->29663 29680->29666 29680->29667 29680->29669 29680->29672 29706 7ff78b9f1440 85 API calls 29680->29706 29681->29663 29682->29656 29684 7ff78ba27189 29683->29684 29685 7ff78ba27124 29683->29685 29720 7ff78b951fc0 71 API calls 29684->29720 29716 7ff78b953a20 29685->29716 29688 7ff78ba27195 29721 7ff78b952540 29688->29721 29690 7ff78ba27164 29692 7ff78ba27174 29690->29692 29727 7ff78b951fc0 71 API calls 29690->29727 29692->29675 29693 7ff78ba271b4 29694 7ff78b952540 26 API calls 29693->29694 29695 7ff78ba271c7 29694->29695 29696 7ff78ba271e1 29695->29696 29697 7ff78ba27254 29695->29697 29699 7ff78ba271e9 29696->29699 29700 7ff78ba2720d 29696->29700 29728 7ff78b9dfc50 85 API calls 29697->29728 29701 7ff78b9520e0 85 API calls 29699->29701 29702 7ff78b9520e0 85 API calls 29700->29702 29704 7ff78ba27221 29700->29704 29703 7ff78ba271f8 29701->29703 29702->29704 29703->29675 29704->29675 29708 7ff78b9520e9 29707->29708 29709 7ff78b95213b 29707->29709 29710 7ff78b95212e 29708->29710 29831 7ff78b95c700 29708->29831 29712 7ff78b952540 26 API calls 29709->29712 29713 7ff78b95218c 29709->29713 29710->29675 29714 7ff78ba03d80 29712->29714 29713->29675 29715->29677 29717 7ff78b953a6e 29716->29717 29729 7ff78b95bf90 29717->29729 29719 7ff78b953a7e 29719->29690 29720->29688 29722 7ff78b9525fb 29721->29722 29782 7ff78ba03e60 29722->29782 29727->29693 29730 7ff78b95bfb5 29729->29730 29731 7ff78b95c03b 29730->29731 29733 7ff78b9674ab 29730->29733 29731->29719 29734 7ff78b9674ec 29733->29734 29735 7ff78b967516 29733->29735 29737 7ff78b9674fa 29734->29737 29738 7ff78b9674f5 DebugBreak 29734->29738 29741 7ff78b96d150 29735->29741 29737->29731 29738->29737 29745 7ff78b96d182 29741->29745 29749 7ff78b967539 29745->29749 29751 7ff78b96d2c2 29745->29751 29754 7ff78b96de60 29745->29754 29763 7ff78b9925f0 WaitForSingleObject 29745->29763 29764 7ff78b97adc0 SleepEx SwitchToThread SwitchToThread 29745->29764 29765 7ff78b973910 39 API calls 29745->29765 29749->29737 29753 7ff78b96a000 SleepEx SwitchToThread DebugBreak ISource 29749->29753 29751->29745 29752 7ff78b986690 GetTickCount64 29751->29752 29766 7ff78b973910 39 API calls 29751->29766 29767 7ff78b992520 29751->29767 29777 7ff78b96d810 59 API calls 29751->29777 29752->29751 29753->29737 29755 7ff78b96de9c 29754->29755 29762 7ff78b96df48 29754->29762 29756 7ff78b96df09 29755->29756 29757 7ff78b96df5a 29755->29757 29758 7ff78b96df18 SwitchToThread 29756->29758 29757->29762 29779 7ff78b967060 WaitForSingleObject 29757->29779 29760 7ff78b96df26 29758->29760 29760->29762 29778 7ff78b97adc0 SleepEx SwitchToThread SwitchToThread 29760->29778 29762->29745 29763->29745 29764->29745 29765->29745 29766->29751 29768 7ff78b992540 29767->29768 29769 7ff78b9925da 29767->29769 29770 7ff78b960e30 10 API calls 29768->29770 29769->29751 29771 7ff78b992567 29770->29771 29772 7ff78b9925ca 29771->29772 29780 7ff78b967060 WaitForSingleObject 29771->29780 29772->29751 29774 7ff78b99259e 29775 7ff78b9925b1 29774->29775 29781 7ff78b97adc0 SleepEx SwitchToThread SwitchToThread 29774->29781 29775->29751 29777->29751 29778->29762 29779->29760 29780->29774 29781->29775 29783 7ff78ba03e72 29782->29783 29786 7ff78ba03f20 29783->29786 29785 7ff78ba03eab 29799 7ff78b957220 29786->29799 29788 7ff78ba04048 29819 7ff78b9539d0 29788->29819 29789 7ff78ba0401a 29789->29788 29824 7ff78ba03ac0 9 API calls 29789->29824 29790 7ff78ba03f8e 29790->29789 29823 7ff78b957350 16 API calls 29790->29823 29793 7ff78b957220 10 API calls 29797 7ff78ba04076 29793->29797 29796 7ff78ba040bf 29796->29785 29797->29796 29825 7ff78b957350 16 API calls 29797->29825 29800 7ff78b957262 29799->29800 29801 7ff78b9572a7 29800->29801 29802 7ff78b957267 29800->29802 29805 7ff78b960130 4 API calls 29801->29805 29806 7ff78b9572c1 29801->29806 29803 7ff78b960130 4 API calls 29802->29803 29804 7ff78b957281 29802->29804 29803->29804 29826 7ff78b9566b0 8 API calls _swprintf_c_l 29804->29826 29805->29806 29807 7ff78b9572dd 29806->29807 29808 7ff78b9572f2 29806->29808 29828 7ff78b956e60 RaiseFailFastException RaiseFailFastException 29807->29828 29829 7ff78b956e60 RaiseFailFastException RaiseFailFastException 29808->29829 29812 7ff78b95729d 29827 7ff78b956e60 RaiseFailFastException RaiseFailFastException 29812->29827 29813 7ff78b9572e9 29815 7ff78b9572a5 29813->29815 29816 7ff78b960130 4 API calls 29813->29816 29817 7ff78b957329 29815->29817 29830 7ff78b956020 RaiseFailFastException RaiseFailFastException 29815->29830 29816->29815 29817->29790 29820 7ff78b9539f6 29819->29820 29821 7ff78b9539fa RaiseFailFastException 29820->29821 29822 7ff78b953a07 29820->29822 29821->29822 29822->29793 29823->29790 29824->29788 29825->29797 29826->29812 29827->29815 29828->29813 29829->29813 29830->29817 29832 7ff78b95c746 29831->29832 29833 7ff78b95c786 29832->29833 29834 7ff78b9674ab 69 API calls 29832->29834 29836 7ff78b96759b 29832->29836 29833->29709 29834->29833 29837 7ff78b9675bc 29836->29837 29838 7ff78b9675ce 29837->29838 29857 7ff78b973910 39 API calls 29837->29857 29840 7ff78b967625 29838->29840 29843 7ff78b9675fe GetTickCount64 29838->29843 29850 7ff78b9676a7 29838->29850 29841 7ff78b967637 29840->29841 29858 7ff78b973910 39 API calls 29840->29858 29842 7ff78b992520 14 API calls 29841->29842 29853 7ff78b967649 29842->29853 29843->29840 29846 7ff78b967612 29843->29846 29846->29850 29847 7ff78b9676e3 29848 7ff78b967570 29847->29848 29849 7ff78b9674fa 29847->29849 29851 7ff78b967709 29847->29851 29856 7ff78b9925f0 WaitForSingleObject 29848->29856 29849->29833 29850->29848 29859 7ff78b96d810 59 API calls 29850->29859 29851->29849 29860 7ff78b96a000 SleepEx SwitchToThread DebugBreak ISource 29851->29860 29853->29848 29853->29850 29854 7ff78b967683 GetTickCount64 29853->29854 29854->29846 29854->29850 29856->29848 29857->29838 29858->29841 29859->29847 29860->29849 30536 7ff78b986e53 40 API calls _swprintf_c_l 30471 7ff78b952450 26 API calls 30538 7ff78b955650 GetLastError SetLastError RtlRestoreContext 29937 7ff78b99031b 29938 7ff78b99032c 29937->29938 29939 7ff78b99035a 29938->29939 29941 7ff78b968808 29938->29941 29942 7ff78b96880d 29941->29942 29959 7ff78b97ad30 29942->29959 29945 7ff78b96884d 29963 7ff78b961630 QueryPerformanceCounter 29945->29963 29948 7ff78b96886e 29964 7ff78b95c650 29948->29964 29950 7ff78b9688be 29951 7ff78b98e8c0 52 API calls 29950->29951 29954 7ff78b9688c3 29951->29954 29952 7ff78b9689cd 29953 7ff78b97ad30 SwitchToThread 29952->29953 29955 7ff78b968a55 29953->29955 29954->29952 29956 7ff78b961630 QueryPerformanceCounter 29954->29956 29957 7ff78b968a78 29955->29957 29958 7ff78b961680 SetEvent 29955->29958 29956->29952 29957->29939 29958->29957 29960 7ff78b96882f 29959->29960 29961 7ff78b97ad4f 29959->29961 29960->29945 29968 7ff78b961670 ResetEvent 29960->29968 29961->29960 29962 7ff78b97ad91 SwitchToThread 29961->29962 29962->29961 29963->29948 29965 7ff78b95c65d 29964->29965 29969 7ff78b953260 15 API calls 29965->29969 29967 7ff78b95c6c4 29969->29967 30473 7ff78b966820 SleepEx SwitchToThread 30502 7ff78b967f20 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException 30540 7ff78b966a20 SleepEx WaitForSingleObject SwitchToThread SwitchToThread SwitchToThread 30569 7ff78b95a520 9 API calls 30504 7ff78b954720 6 API calls 30419 7ff78ba0e620 30420 7ff78b9554e0 16 API calls 30419->30420 30421 7ff78ba0e640 30420->30421 30432 7ff78b954340 malloc RtlPcToFileHeader RaiseException _swprintf_c_l 30421->30432 30423 7ff78ba0e648 30433 7ff78ba0e7e0 85 API calls 30423->30433 30425 7ff78ba0e666 30426 7ff78b9520e0 85 API calls 30425->30426 30427 7ff78ba0e678 30426->30427 30428 7ff78ba0e69b 30427->30428 30434 7ff78ba0e990 85 API calls 30427->30434 30435 7ff78ba02fa0 85 API calls 30428->30435 30431 7ff78ba0e6a8 30432->30423 30433->30425 30434->30427 30435->30431 30446 7ff78b97d233 89 API calls _swprintf_c_l 30475 7ff78b966830 QueryPerformanceCounter 30476 7ff78b957430 GetCurrentProcess FlushInstructionCache VirtualProtect 30544 7ff78b954230 8 API calls 30571 7ff78b953930 17 API calls 30477 7ff78b9bac2c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 30507 7ff78ba15390 71 API calls 30575 7ff78b963580 24 API calls _swprintf_c_l 30547 7ff78b96a280 ResetEvent 30576 7ff78b97498e 10 API calls 30508 7ff78b9e7f90 13 API calls 30550 7ff78ba0aa80 86 API calls 29870 7ff78b95bb90 29871 7ff78b95bba8 29870->29871 29872 7ff78b95bbaf 29870->29872 29882 7ff78b952d70 29871->29882 29888 7ff78b955260 29872->29888 29875 7ff78b95bbcc 29899 7ff78b960750 29875->29899 29877 7ff78b95bbdc 29902 7ff78b960310 29877->29902 29880 7ff78b95bbeb 29883 7ff78b952d9d 29882->29883 29887 7ff78b952dbb 29883->29887 29923 7ff78b95b4e0 FlsGetValue 29883->29923 29885 7ff78b952db3 29886 7ff78b954930 6 API calls 29885->29886 29886->29887 29887->29872 29889 7ff78b955278 29888->29889 29890 7ff78b955324 29888->29890 29926 7ff78b95b6a0 GetCurrentThreadId 29889->29926 29890->29875 29892 7ff78b95529f GetCurrentProcess GetCurrentThread DuplicateHandle 29927 7ff78b95ca20 VirtualQuery 29892->29927 29894 7ff78b9552ea 29895 7ff78b9552f8 RaiseFailFastException 29894->29895 29896 7ff78b955305 29894->29896 29895->29896 29928 7ff78b95fdd0 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException 29896->29928 29898 7ff78b95530d 29898->29875 29900 7ff78b96075a 29899->29900 29901 7ff78b960761 SetEvent 29899->29901 29900->29877 29901->29877 29904 7ff78b96034a 29902->29904 29906 7ff78b96036f _swprintf_c_l 29902->29906 29903 7ff78b95bbe6 29908 7ff78b972770 29903->29908 29904->29903 29929 7ff78b95fe50 4 API calls 2 library calls 29904->29929 29906->29903 29907 7ff78b9bac48 _swprintf_c_l 3 API calls 29906->29907 29907->29906 29913 7ff78b972784 29908->29913 29910 7ff78b9727b0 EnterCriticalSection 29911 7ff78b97294f LeaveCriticalSection 29910->29911 29912 7ff78b9727cf LeaveCriticalSection 29910->29912 29914 7ff78b972968 29911->29914 29912->29913 29913->29910 29913->29914 29917 7ff78b972893 SwitchToThread 29913->29917 29919 7ff78b9728bf SwitchToThread 29913->29919 29922 7ff78b972887 SwitchToThread 29913->29922 29930 7ff78b9619f0 WaitForSingleObject 29913->29930 29931 7ff78b961690 SleepEx 29913->29931 29932 7ff78b9925f0 WaitForSingleObject 29913->29932 29933 7ff78b961670 ResetEvent 29913->29933 29934 7ff78b979a50 15 API calls 2 library calls 29913->29934 29935 7ff78b961680 SetEvent 29913->29935 29914->29880 29917->29913 29919->29913 29922->29913 29924 7ff78b95b508 FlsSetValue 29923->29924 29925 7ff78b95b4fa RaiseFailFastException 29923->29925 29925->29924 29926->29892 29927->29894 29928->29898 29929->29906 29931->29913 29932->29913 29934->29913 30511 7ff78b984390 13 API calls 2 library calls 29936 7ff78b951758 85 API calls 30512 7ff78ba11b70 88 API calls 30553 7ff78b95b260 malloc RtlPcToFileHeader RaiseException ISource _swprintf_c_l 30578 7ff78b969d60 34 API calls 30051 7ff78b97d16a 30052 7ff78b97d16f 30051->30052 30097 7ff78b990c30 30052->30097 30054 7ff78b97d1b8 DebugBreak 30055 7ff78b97d19a 30054->30055 30055->30054 30056 7ff78b97d1d1 30055->30056 30100 7ff78b96efe0 30056->30100 30058 7ff78b97d210 30162 7ff78b971520 30058->30162 30060 7ff78b97d215 30061 7ff78b97d2bd 30060->30061 30062 7ff78b97d3f2 30060->30062 30225 7ff78b961630 QueryPerformanceCounter 30061->30225 30065 7ff78b97d2c9 30062->30065 30226 7ff78b976190 30062->30226 30066 7ff78b97d66a 30065->30066 30067 7ff78b97d675 30065->30067 30072 7ff78b97d673 30065->30072 30239 7ff78b973910 39 API calls 30066->30239 30067->30072 30240 7ff78b961670 ResetEvent 30067->30240 30072->30072 30195 7ff78b977e30 30072->30195 30076 7ff78b97d909 30083 7ff78b97d95f _swprintf_c_l 30076->30083 30243 7ff78b991200 28 API calls _swprintf_c_l 30076->30243 30078 7ff78b97d8ff 30081 7ff78b95c650 15 API calls 30078->30081 30079 7ff78b97da41 30213 7ff78b978830 30079->30213 30081->30076 30082 7ff78b97dcf1 30086 7ff78b97dda5 30082->30086 30247 7ff78b97a330 30082->30247 30083->30079 30083->30082 30244 7ff78b98d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 30083->30244 30087 7ff78b97d883 SwitchToThread 30088 7ff78b97d74b 30087->30088 30088->30076 30088->30078 30088->30083 30088->30087 30091 7ff78b97d8af SwitchToThread 30088->30091 30092 7ff78b97d877 SwitchToThread 30088->30092 30241 7ff78b961690 SleepEx 30088->30241 30242 7ff78b9925f0 WaitForSingleObject 30088->30242 30091->30088 30092->30088 30094 7ff78b97da4d 30245 7ff78b961630 QueryPerformanceCounter 30094->30245 30095 7ff78b97dbad 30246 7ff78b979a50 15 API calls 2 library calls 30095->30246 30255 7ff78b961630 QueryPerformanceCounter 30097->30255 30099 7ff78b990c40 30099->30055 30101 7ff78b96f00b 30100->30101 30103 7ff78b96f118 _swprintf_c_l 30101->30103 30257 7ff78b9711b0 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException ISource 30101->30257 30104 7ff78b96f679 30103->30104 30105 7ff78b960130 4 API calls 30103->30105 30256 7ff78b961680 SetEvent 30104->30256 30105->30104 30107 7ff78b96f685 SwitchToThread 30108 7ff78b96f691 30107->30108 30109 7ff78b994870 12 API calls 30108->30109 30110 7ff78b96f6ef 30109->30110 30111 7ff78b98d800 9 API calls 30110->30111 30112 7ff78b96f70a 30111->30112 30113 7ff78b98d800 9 API calls 30112->30113 30114 7ff78b96f714 30113->30114 30115 7ff78b970a80 SwitchToThread SwitchToThread 30114->30115 30129 7ff78b96f72f 30115->30129 30116 7ff78b96f873 30117 7ff78b961630 QueryPerformanceCounter 30116->30117 30118 7ff78b96f878 30117->30118 30120 7ff78b97ad30 SwitchToThread 30118->30120 30119 7ff78b96f7f7 SwitchToThread 30119->30129 30121 7ff78b96f8c3 30120->30121 30122 7ff78b96f8e1 30121->30122 30125 7ff78b961670 ResetEvent 30121->30125 30127 7ff78b95c650 15 API calls 30122->30127 30123 7ff78b96f823 SwitchToThread 30123->30129 30124 7ff78b961690 SleepEx 30124->30129 30125->30122 30126 7ff78b9925f0 WaitForSingleObject 30126->30129 30128 7ff78b96f8ff 30127->30128 30130 7ff78b97ad30 SwitchToThread 30128->30130 30129->30116 30129->30119 30129->30123 30129->30124 30129->30126 30131 7ff78b96f7eb SwitchToThread 30129->30131 30132 7ff78b96f90a 30130->30132 30131->30129 30133 7ff78b96f928 30132->30133 30134 7ff78b961680 SetEvent 30132->30134 30135 7ff78b961680 SetEvent 30133->30135 30134->30133 30137 7ff78b96f93e 30135->30137 30136 7ff78b96f95e DebugBreak 30136->30137 30137->30136 30138 7ff78b96f977 30137->30138 30139 7ff78b961630 QueryPerformanceCounter 30138->30139 30140 7ff78b96fa02 30138->30140 30139->30140 30141 7ff78b961630 QueryPerformanceCounter 30140->30141 30145 7ff78b96fa4b 30140->30145 30141->30145 30142 7ff78b96fb4f 30143 7ff78b994870 12 API calls 30142->30143 30151 7ff78b96fb68 30143->30151 30144 7ff78b96fdb4 30147 7ff78b971340 SwitchToThread SwitchToThread 30144->30147 30145->30142 30146 7ff78b960130 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException 30145->30146 30146->30145 30149 7ff78b96fdde 30147->30149 30148 7ff78b994a40 FlushProcessWriteBuffers FlushProcessWriteBuffers 30148->30151 30150 7ff78b961630 QueryPerformanceCounter 30149->30150 30153 7ff78b96fe09 30149->30153 30150->30153 30151->30144 30151->30148 30152 7ff78b98d320 SwitchToThread SwitchToThread 30151->30152 30152->30151 30154 7ff78b96fedd 30153->30154 30155 7ff78b961630 QueryPerformanceCounter 30153->30155 30156 7ff78b971340 SwitchToThread SwitchToThread 30154->30156 30155->30154 30157 7ff78b96ff64 30156->30157 30158 7ff78b961630 QueryPerformanceCounter 30157->30158 30159 7ff78b96ff79 30157->30159 30158->30159 30160 7ff78b961630 QueryPerformanceCounter 30159->30160 30161 7ff78b970005 30159->30161 30160->30161 30161->30058 30164 7ff78b971540 30162->30164 30163 7ff78b9920b0 3 API calls 30166 7ff78b971732 30163->30166 30164->30163 30258 7ff78b961630 QueryPerformanceCounter 30166->30258 30168 7ff78b9718a1 30259 7ff78b96e8a0 30168->30259 30169 7ff78b9722ec SwitchToThread 30187 7ff78b97194d _swprintf_c_l 30169->30187 30170 7ff78b976190 10 API calls 30190 7ff78b9723cb 30170->30190 30171 7ff78b9920b0 3 API calls 30171->30187 30173 7ff78b972236 SwitchToThread 30173->30187 30174 7ff78b972087 DebugBreak 30174->30187 30176 7ff78b972262 SwitchToThread 30176->30187 30180 7ff78b972510 30189 7ff78b972522 30180->30189 30280 7ff78b961630 QueryPerformanceCounter 30180->30280 30182 7ff78b972327 30182->30170 30183 7ff78b97206f SwitchToThread 30183->30187 30187->30169 30187->30171 30187->30173 30187->30174 30187->30176 30187->30182 30187->30183 30263 7ff78b983410 VirtualAlloc VirtualUnlock _swprintf_c_l 30187->30263 30264 7ff78b990010 VirtualAlloc VirtualUnlock 30187->30264 30265 7ff78b977970 VirtualFree EnterCriticalSection LeaveCriticalSection 30187->30265 30266 7ff78b98a0f0 6 API calls _swprintf_c_l 30187->30266 30267 7ff78b990e70 DebugBreak DebugBreak DebugBreak DebugBreak 30187->30267 30268 7ff78b992480 30187->30268 30276 7ff78b961690 SleepEx 30187->30276 30277 7ff78b9925f0 WaitForSingleObject 30187->30277 30188 7ff78b972493 SwitchToThread 30188->30190 30189->30060 30190->30180 30190->30188 30190->30189 30191 7ff78b9724bf SwitchToThread 30190->30191 30194 7ff78b972487 SwitchToThread 30190->30194 30278 7ff78b961690 SleepEx 30190->30278 30279 7ff78b9925f0 WaitForSingleObject 30190->30279 30191->30190 30194->30190 30196 7ff78b977f54 30195->30196 30197 7ff78b977e41 30195->30197 30205 7ff78b9920b0 30196->30205 30198 7ff78b960130 4 API calls 30197->30198 30201 7ff78b977e5c 30198->30201 30199 7ff78b977eb4 30200 7ff78b977f04 30199->30200 30202 7ff78b960130 4 API calls 30199->30202 30200->30196 30204 7ff78b960130 4 API calls 30200->30204 30201->30199 30203 7ff78b960130 4 API calls 30201->30203 30202->30199 30203->30201 30204->30200 30209 7ff78b9920b9 30205->30209 30206 7ff78b99224d 30206->30088 30207 7ff78b992146 30210 7ff78b9921c6 30207->30210 30211 7ff78b9921b7 DebugBreak 30207->30211 30208 7ff78b992137 DebugBreak 30208->30207 30209->30206 30209->30207 30209->30208 30210->30206 30212 7ff78b99223a DebugBreak 30210->30212 30211->30210 30212->30206 30214 7ff78b97885a 30213->30214 30215 7ff78b978888 30214->30215 30224 7ff78b978a76 30214->30224 30219 7ff78b97891b 30215->30219 30287 7ff78b977a30 30215->30287 30218 7ff78b979954 30218->30094 30221 7ff78b9789e5 EnterCriticalSection LeaveCriticalSection 30219->30221 30223 7ff78b978a71 30219->30223 30294 7ff78b961770 VirtualFree 30219->30294 30221->30219 30295 7ff78b9bacf0 8 API calls 2 library calls 30223->30295 30224->30223 30282 7ff78b977be0 30224->30282 30225->30065 30227 7ff78b9761c8 30226->30227 30228 7ff78b976486 30227->30228 30229 7ff78b976306 30227->30229 30238 7ff78b9762ea 30227->30238 30230 7ff78b978200 10 API calls 30228->30230 30231 7ff78b978200 10 API calls 30229->30231 30230->30238 30233 7ff78b97632d 30231->30233 30232 7ff78b9765e6 30232->30062 30234 7ff78b978200 10 API calls 30233->30234 30233->30238 30236 7ff78b976356 30234->30236 30237 7ff78b960e30 10 API calls 30236->30237 30236->30238 30237->30238 30238->30232 30297 7ff78b978200 30238->30297 30239->30072 30241->30088 30242->30088 30243->30083 30244->30083 30245->30095 30246->30082 30248 7ff78b97a37a 30247->30248 30249 7ff78b97a33f 30247->30249 30302 7ff78b966ee0 QueryPerformanceCounter 30248->30302 30250 7ff78b960130 4 API calls 30249->30250 30250->30248 30252 7ff78b97a3cb 30303 7ff78b97c0c0 8 API calls ISource 30252->30303 30254 7ff78b97a3d0 30254->30086 30255->30099 30257->30101 30258->30168 30261 7ff78b96e8f3 _swprintf_c_l 30259->30261 30260 7ff78b96ef24 30260->30187 30261->30260 30262 7ff78b983410 VirtualAlloc VirtualUnlock 30261->30262 30262->30261 30263->30187 30264->30187 30265->30187 30266->30187 30267->30187 30269 7ff78b99249a 30268->30269 30270 7ff78b9924a3 30269->30270 30281 7ff78b961770 VirtualFree 30269->30281 30272 7ff78b9924f3 30270->30272 30273 7ff78b9924bd EnterCriticalSection 30270->30273 30272->30187 30274 7ff78b9924e0 30273->30274 30275 7ff78b9924e7 LeaveCriticalSection 30273->30275 30274->30275 30275->30272 30276->30187 30277->30187 30278->30190 30279->30190 30280->30189 30281->30270 30283 7ff78b977bed 30282->30283 30284 7ff78b977bf4 30282->30284 30283->30223 30285 7ff78b977a30 5 API calls 30284->30285 30286 7ff78b977c69 30284->30286 30285->30284 30286->30223 30288 7ff78b992480 3 API calls 30287->30288 30289 7ff78b977a69 _swprintf_c_l 30288->30289 30290 7ff78b977b69 30289->30290 30296 7ff78b961770 VirtualFree 30289->30296 30290->30215 30290->30290 30292 7ff78b977b2e 30292->30290 30293 7ff78b977b3c EnterCriticalSection LeaveCriticalSection 30292->30293 30293->30290 30294->30219 30295->30218 30296->30292 30298 7ff78b978238 30297->30298 30300 7ff78b978258 30297->30300 30298->30238 30299 7ff78b960e30 10 API calls 30301 7ff78b978500 30299->30301 30300->30299 30300->30301 30301->30238 30302->30252 30303->30254 30436 7ff78ba0a660 30439 7ff78ba0a66d 30436->30439 30437 7ff78ba0a67b 30439->30437 30445 7ff78b9dfe10 85 API calls 30439->30445 30513 7ff78ba0ab60 87 API calls
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: SwitchThread$BreakDebug
                    • String ID: 0 E
                    • API String ID: 223621376-1209576767
                    • Opcode ID: 61c8feea51c96d2b55d0625f61853f3a51bfabf188de4ec07fb4fecd81a919d9
                    • Instruction ID: 22478dac8f61413b31d14e608411463395f265cf8d0e8d592b1e97391c69e826
                    • Opcode Fuzzy Hash: 61c8feea51c96d2b55d0625f61853f3a51bfabf188de4ec07fb4fecd81a919d9
                    • Instruction Fuzzy Hash: D4B27A21A18692C6EA64AF2D984477AB3E0BF45B94FF84235D95D423F1EF3CE484C325

                    Control-flow Graph

                    APIs
                    • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B96146F
                    • GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B9614AD
                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B9614D9
                    • GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B9614EA
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B9614F9
                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B961590
                    • GetProcessAffinityMask.KERNEL32 ref: 00007FF78B9615A3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Process$AffinityCurrent$ErrorGroupHighestInfoLastMaskNodeNumaNumberSystem
                    • String ID:
                    • API String ID: 580471860-0
                    • Opcode ID: 03dbf51e9477a4b2f0782d4ffae03c46400fccc10c807166d3160a18ce5dc755
                    • Instruction ID: 81b0af78a2733cca73d521a717ef7deceaf1bd9606813a7052741cda3d454537
                    • Opcode Fuzzy Hash: 03dbf51e9477a4b2f0782d4ffae03c46400fccc10c807166d3160a18ce5dc755
                    • Instruction Fuzzy Hash: 8851A071A18786C6EA00AF5DE84456AF3A1FB4A784FE85032D94E87375EF3CE544C721
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug
                    • String ID: END
                    • API String ID: 456121617-2522575163
                    • Opcode ID: 20a7085b6193554ad28110b0e8ff0c5543d49b9682d46e4e1af2237d4f8c6a77
                    • Instruction ID: 02d34aab5ecc901887ce746d0db3619f7e235c1a46b5611f0871c59468a77afe
                    • Opcode Fuzzy Hash: 20a7085b6193554ad28110b0e8ff0c5543d49b9682d46e4e1af2237d4f8c6a77
                    • Instruction Fuzzy Hash: 8A828CB1A09786C6EA60BF2DE448674B3E4BF45B84FF84236D95D422B1EF3CA445C325
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3168844106-0
                    • Opcode ID: 6f93bc1d4941456f45dda91854c7f695a82bcce70b9b063c41ad38af2987899c
                    • Instruction ID: 2ce4fb1db9ef99c9a9a5ccb92a8eef83000a9b0fe0b8eb5ebb06b483d31c4b79
                    • Opcode Fuzzy Hash: 6f93bc1d4941456f45dda91854c7f695a82bcce70b9b063c41ad38af2987899c
                    • Instruction Fuzzy Hash: 60B23972A09B8686EA60AF1DE884679B3E4FB48B44FE84635C98C17775DF3CE051C325
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: GlobalMemoryProcessQueryStatus$CurrentFrequencyInformationObjectPerformance
                    • String ID: Creation of WaitForGCEvent failed$TraceGC is not turned on
                    • API String ID: 133006248-518909315
                    • Opcode ID: 3f99d9c4068ce16fac88113a0baf40306a504a41c0001bff05d2c2920de71d5b
                    • Instruction ID: ee197b8da14d7e4019018296e5482358392ff76268a9d4abfd004b215fd35ff5
                    • Opcode Fuzzy Hash: 3f99d9c4068ce16fac88113a0baf40306a504a41c0001bff05d2c2920de71d5b
                    • Instruction Fuzzy Hash: E3B16D61E0DB82C1EA55BB6CA449779E291BF4A784FF84135E94E077B2EF2CE045C321
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: InfoLocale
                    • String ID:
                    • API String ID: 2299586839-0
                    • Opcode ID: ecc120c17447902b84dd65978579eb4ee08e6082c242e837b02859beb14b59ee
                    • Instruction ID: 9cf81822bf04a10abab94c285f16387d322d08b51f98f8a93a68792887cada34
                    • Opcode Fuzzy Hash: ecc120c17447902b84dd65978579eb4ee08e6082c242e837b02859beb14b59ee
                    • Instruction Fuzzy Hash: B9219F33A09A91D9D764EFA9EC405E977A0FB44398FA40135FE4E83A59DF38D481C350
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ab9d3395acc446df8bbb42c9f9c476036a8486221088c5072eea3ff1e419bc9a
                    • Instruction ID: 1323fd5eb55489946db97b0fbe0bd9d16a635657ef82bf41ac7388f8ea9eda91
                    • Opcode Fuzzy Hash: ab9d3395acc446df8bbb42c9f9c476036a8486221088c5072eea3ff1e419bc9a
                    • Instruction Fuzzy Hash: 4262DE71A18B86CAEA65AF2DE444739F6E5BF44780FF48135DA1E53270EF3CA840C624
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 755864b5fa2e0ffc51d8cb0fddda48fb3472de9c38ab859b6004a688e4e9f16c
                    • Instruction ID: 5ce2d142c9a86c00b88622d7bcee841f1853c224021c3f9a170a4a59bd8790d2
                    • Opcode Fuzzy Hash: 755864b5fa2e0ffc51d8cb0fddda48fb3472de9c38ab859b6004a688e4e9f16c
                    • Instruction Fuzzy Hash: 5AF10811E19B8D81E9129A3F51457B5D6C17F6A7C0EBDCB32E94E367B1EB2CB081C214
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3eaec6c614a22b4bfc9c5d5be89dec5bd8cb119001862e3a8836eb87554737c1
                    • Instruction ID: 7f380f70d3e009e3565b7d4a8cb7011887978c218f81063974ae53679a0c6ad9
                    • Opcode Fuzzy Hash: 3eaec6c614a22b4bfc9c5d5be89dec5bd8cb119001862e3a8836eb87554737c1
                    • Instruction Fuzzy Hash: 1AF16321D1CB8385F616FB2CA955675E291BF5A384FF89336D44D252B2FF2CB490C221
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3b75d4973c46ecb9e1d334320fc60b824bc8d14c1f319ac792522a3ad0e4b68c
                    • Instruction ID: 72e47fff774bde8c34cffb0b3b2782cb390319a1355c0669d6d3994ec996f859
                    • Opcode Fuzzy Hash: 3b75d4973c46ecb9e1d334320fc60b824bc8d14c1f319ac792522a3ad0e4b68c
                    • Instruction Fuzzy Hash: 40D17E72A09B82C6EB509F19E548769B7E4FB08B94FE84235DA5D03BA0DF3CE455C314

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 408 7ff78b97c9b6-7ff78b97c9bd 409 7ff78b97c9da-7ff78b97ca10 call 7ff78b9809b0 408->409 410 7ff78b97c9bf-7ff78b97c9d5 call 7ff78b990c30 408->410 416 7ff78b97ca25-7ff78b97ca37 409->416 417 7ff78b97ca12-7ff78b97ca23 call 7ff78b9bac40 409->417 415 7ff78b97d0fd-7ff78b97d120 410->415 419 7ff78b97d127-7ff78b97d12e 415->419 420 7ff78b97d122 call 7ff78b96bdb0 415->420 421 7ff78b97ca3e-7ff78b97ca50 call 7ff78b98adb0 call 7ff78b96e5f0 416->421 422 7ff78b97ca39 call 7ff78b9767f0 416->422 417->416 420->419 430 7ff78b97cabc-7ff78b97cb0c call 7ff78b97dfd0 call 7ff78b982370 421->430 431 7ff78b97ca52-7ff78b97ca5c 421->431 422->421 443 7ff78b97cb0e-7ff78b97cb25 call 7ff78b960130 430->443 444 7ff78b97cb2b-7ff78b97cb38 430->444 432 7ff78b97ca5e 431->432 433 7ff78b97cab5 431->433 436 7ff78b97ca60-7ff78b97ca6d 432->436 433->430 438 7ff78b97caa5-7ff78b97cab3 call 7ff78b98d0e0 436->438 439 7ff78b97ca6f-7ff78b97caa0 call 7ff78b9bf5b0 436->439 438->433 438->436 439->438 443->444 447 7ff78b97cb3a-7ff78b97cb44 444->447 448 7ff78b97cb57-7ff78b97cb5a 444->448 447->448 450 7ff78b97cb46-7ff78b97cb4e 447->450 451 7ff78b97cb5c 448->451 452 7ff78b97cb63-7ff78b97cb79 call 7ff78b952c80 448->452 450->448 453 7ff78b97cb50 450->453 451->452 456 7ff78b97cb7b-7ff78b97cb83 452->456 457 7ff78b97cbe6-7ff78b97cc18 call 7ff78b95c0a0 call 7ff78b97a330 call 7ff78b977e30 call 7ff78b9626e0 452->457 453->448 456->457 458 7ff78b97cb85-7ff78b97cb8c 456->458 470 7ff78b97cc2b-7ff78b97cc37 call 7ff78b9626e0 457->470 471 7ff78b97cc1a-7ff78b97cc21 call 7ff78b9626e0 457->471 458->457 460 7ff78b97cb8e-7ff78b97cb95 458->460 460->457 462 7ff78b97cb97-7ff78b97cba4 460->462 462->457 464 7ff78b97cba6-7ff78b97cbdf 462->464 464->457 477 7ff78b97cc3d-7ff78b97ccbb EnterCriticalSection 470->477 478 7ff78b97d0c7 call 7ff78b97d130 470->478 471->470 476 7ff78b97cc23-7ff78b97cc26 call 7ff78b991200 471->476 476->470 480 7ff78b97cd1e-7ff78b97cd25 LeaveCriticalSection 477->480 481 7ff78b97ccbd-7ff78b97ccc4 477->481 485 7ff78b97d0cc-7ff78b97d0f6 GetTickCount64 478->485 483 7ff78b97cd2a-7ff78b97cd4c 480->483 481->480 484 7ff78b97ccc6-7ff78b97ccda call 7ff78b95bc10 481->484 486 7ff78b97cf66-7ff78b97cf77 483->486 487 7ff78b97cd52-7ff78b97cd59 483->487 491 7ff78b97ccdf-7ff78b97ccea 484->491 485->415 489 7ff78b97cf7d-7ff78b97cf8c 486->489 490 7ff78b97cd60-7ff78b97cd66 487->490 489->478 492 7ff78b97cf92-7ff78b97cf99 489->492 493 7ff78b97cd6c-7ff78b97cd76 490->493 494 7ff78b97ce59-7ff78b97ce63 490->494 491->480 495 7ff78b97ccec-7ff78b97cd01 LeaveCriticalSection 491->495 497 7ff78b97cfa0-7ff78b97cff0 492->497 498 7ff78b97cd99-7ff78b97cd9c 493->498 499 7ff78b97cd78 493->499 494->490 496 7ff78b97ce69-7ff78b97cee5 call 7ff78b95c570 494->496 495->483 500 7ff78b97cd03-7ff78b97cd0c 495->500 512 7ff78b97cf0d-7ff78b97cf17 496->512 513 7ff78b97cee7-7ff78b97ceea 496->513 497->497 502 7ff78b97cff2-7ff78b97d02f 497->502 498->494 504 7ff78b97cda2-7ff78b97cda8 498->504 503 7ff78b97cd80-7ff78b97cd87 499->503 500->483 505 7ff78b97cd0e-7ff78b97cd1c call 7ff78b95bf70 500->505 502->485 507 7ff78b97d035-7ff78b97d057 call 7ff78b97d130 502->507 503->494 508 7ff78b97cd8d-7ff78b97cd97 503->508 509 7ff78b97cdae-7ff78b97cdb5 504->509 510 7ff78b97ce4c-7ff78b97ce53 504->510 505->483 521 7ff78b97d05c-7ff78b97d0c5 call 7ff78b979980 507->521 508->498 508->503 515 7ff78b97cdb7-7ff78b97cdc8 509->515 516 7ff78b97ce1f-7ff78b97ce2a call 7ff78b974020 509->516 510->494 510->504 519 7ff78b97cf19-7ff78b97cf24 512->519 520 7ff78b97cf26-7ff78b97cf51 call 7ff78b980950 call 7ff78b97a330 512->520 518 7ff78b97cef1-7ff78b97cef4 513->518 523 7ff78b97cdca-7ff78b97cdd1 515->523 524 7ff78b97cdf3 515->524 531 7ff78b97ce2f-7ff78b97ce31 516->531 518->512 527 7ff78b97cef6-7ff78b97cf0b 518->527 528 7ff78b97cf56-7ff78b97cf5d 519->528 520->528 521->485 532 7ff78b97cdee-7ff78b97cdf1 523->532 533 7ff78b97cdd3-7ff78b97cde1 call 7ff78b974020 523->533 526 7ff78b97cdf6-7ff78b97ce0f call 7ff78b974020 524->526 526->486 547 7ff78b97ce15-7ff78b97ce1d 526->547 527->512 527->518 528->489 538 7ff78b97cf5f-7ff78b97cf64 call 7ff78b979980 528->538 531->486 537 7ff78b97ce37-7ff78b97ce3d 531->537 532->524 532->526 533->486 546 7ff78b97cde7-7ff78b97cdec 533->546 543 7ff78b97ce44-7ff78b97ce48 537->543 544 7ff78b97ce3f 537->544 538->489 543->510 544->543 546->510 547->510
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID: .NET BGC$BEGIN$condemned generation num: %d$m$qX
                    • API String ID: 0-2393834873
                    • Opcode ID: 85bfa98263a7aa4acd22e018ec2df517a95a4a9b6cb85e1c8a29af8d1d3e455b
                    • Instruction ID: 1d613cade4d5ddd1b3c5c1328ffdb5bea45de51271dcabcf0a2b91ca0dc4264a
                    • Opcode Fuzzy Hash: 85bfa98263a7aa4acd22e018ec2df517a95a4a9b6cb85e1c8a29af8d1d3e455b
                    • Instruction Fuzzy Hash: ED223D61D0CA83C5F611AF2CA445AB4E3B0BF55784FE85236DA4C52272EF3CA589C365

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: GlobalMemoryStatus$Process$CurrentInformationObjectQuery
                    • String ID: @$@$@
                    • API String ID: 2645093340-1177533131
                    • Opcode ID: 5dd9200fce8176dff0c68b0307820b989f4da3af5f934f64af2f0f02580b9126
                    • Instruction ID: 8e1ad72b36f755542c5cb43f96b442af8d7e198094ac391f5ed978f6732ee25e
                    • Opcode Fuzzy Hash: 5dd9200fce8176dff0c68b0307820b989f4da3af5f934f64af2f0f02580b9126
                    • Instruction Fuzzy Hash: 7D41A1327086D1C5EB619F55E4147AAB3A0FB49BA0F949231DA9D43B98DF3CD445CB10

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 861 7ff78b972770-7ff78b97278f call 7ff78b9ba94c 864 7ff78b972790-7ff78b9727ae call 7ff78b95be70 call 7ff78b9619f0 861->864 869 7ff78b9727d6-7ff78b9727dc 864->869 870 7ff78b9727b0-7ff78b9727c9 EnterCriticalSection 864->870 873 7ff78b972968-7ff78b972971 869->873 874 7ff78b9727e2-7ff78b9727ec call 7ff78b97d130 869->874 871 7ff78b97294f-7ff78b972963 LeaveCriticalSection 870->871 872 7ff78b9727cf-7ff78b9727d4 LeaveCriticalSection 870->872 871->873 872->864 875 7ff78b97298b-7ff78b97299a 873->875 876 7ff78b972973-7ff78b97297b 873->876 879 7ff78b9727f1-7ff78b972803 call 7ff78b95be70 874->879 876->875 878 7ff78b97297d-7ff78b972985 call 7ff78b95bf70 876->878 878->875 884 7ff78b972809 879->884 885 7ff78b97290f-7ff78b97294a call 7ff78b961670 call 7ff78b979a50 call 7ff78b961680 879->885 886 7ff78b972810-7ff78b97281b 884->886 885->864 888 7ff78b9728fc-7ff78b972909 886->888 889 7ff78b972821-7ff78b972827 886->889 888->885 888->886 891 7ff78b97289c-7ff78b9728ac call 7ff78b95be70 889->891 892 7ff78b972829-7ff78b972831 889->892 905 7ff78b9728ae-7ff78b9728b5 891->905 906 7ff78b9728d0-7ff78b9728d8 891->906 892->891 895 7ff78b972833-7ff78b97283a 892->895 897 7ff78b97283c-7ff78b972849 895->897 898 7ff78b972893-7ff78b97289a SwitchToThread 895->898 901 7ff78b97286d-7ff78b972876 897->901 902 7ff78b97284b 897->902 904 7ff78b9728ed-7ff78b9728f6 898->904 901->904 910 7ff78b972878-7ff78b972880 901->910 907 7ff78b972850-7ff78b972859 902->907 904->888 904->889 911 7ff78b9728b7-7ff78b9728bd 905->911 912 7ff78b9728c6-7ff78b9728cb call 7ff78b961690 905->912 908 7ff78b9728da-7ff78b9728df call 7ff78b9925f0 906->908 909 7ff78b9728e4-7ff78b9728e6 906->909 907->901 915 7ff78b97285b-7ff78b972863 907->915 908->909 909->904 917 7ff78b9728e8 call 7ff78b95bde0 909->917 910->904 918 7ff78b972882-7ff78b972891 call 7ff78b95be70 SwitchToThread 910->918 911->912 913 7ff78b9728bf-7ff78b9728c4 SwitchToThread 911->913 912->906 913->906 915->901 919 7ff78b972865-7ff78b97286b 915->919 917->904 918->909 919->901 919->907
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSectionSwitchThread$Leave$Enter
                    • String ID:
                    • API String ID: 1765607624-0
                    • Opcode ID: fb0f990667423020e3bd5e8da849c1bc19f2cba59cb6fe26b82e41a2ff29db20
                    • Instruction ID: 4c0fdd9f45fd16029eabb3ee772caae2ee57dff0790fdf2c303100240b466017
                    • Opcode Fuzzy Hash: fb0f990667423020e3bd5e8da849c1bc19f2cba59cb6fe26b82e41a2ff29db20
                    • Instruction Fuzzy Hash: 7D514931E1C693C6F660BF2CA8459B9B2D0BF06750FF80236E52D821F2DE2DA444D676

                    Control-flow Graph

                    APIs
                    • FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF78B95474F,?,?,?,?,?,?,00007FF78B951EA0), ref: 00007FF78B95B82B
                      • Part of subcall function 00007FF78B961460: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B96146F
                      • Part of subcall function 00007FF78B961460: GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B9614AD
                      • Part of subcall function 00007FF78B961460: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B9614D9
                      • Part of subcall function 00007FF78B961460: GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B9614EA
                      • Part of subcall function 00007FF78B961460: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF78B95B84A), ref: 00007FF78B9614F9
                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,00007FF78B95474F,?,?,?,?,?,?,00007FF78B951EA0), ref: 00007FF78B95B89D
                    • GetProcessAffinityMask.KERNEL32 ref: 00007FF78B95B8B0
                    • QueryInformationJobObject.KERNEL32 ref: 00007FF78B95B8FE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Process$AffinityCurrent$AllocErrorGroupHighestInfoInformationLastMaskNodeNumaNumberObjectQuerySystem
                    • String ID: PROCESSOR_COUNT
                    • API String ID: 1701933505-4048346908
                    • Opcode ID: 1798012f5346184bb27c1ec9873b0fd67c426a3d4d250c8375ff5738cd3cdd6f
                    • Instruction ID: 20636c6577a5542a2df8699d49795bf7ec3730f977b6f4ac93c7df30ea92cbeb
                    • Opcode Fuzzy Hash: 1798012f5346184bb27c1ec9873b0fd67c426a3d4d250c8375ff5738cd3cdd6f
                    • Instruction Fuzzy Hash: 83317161A48E82C6EA54BF58D4D03BDE3A1FF48788FE41035D64D866B5DE2CE409C761

                    Control-flow Graph

                    APIs
                      • Part of subcall function 00007FF78B95B820: FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF78B95474F,?,?,?,?,?,?,00007FF78B951EA0), ref: 00007FF78B95B82B
                      • Part of subcall function 00007FF78B95B820: QueryInformationJobObject.KERNEL32 ref: 00007FF78B95B8FE
                      • Part of subcall function 00007FF78B95B6C0: GetModuleHandleExW.KERNEL32(?,?,?,?,00007FF78B954778,?,?,?,?,?,?,00007FF78B951EA0), ref: 00007FF78B95B6D1
                    • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00007FF78B951EA0), ref: 00007FF78B9548BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: AllocExceptionFailFastHandleInformationModuleObjectQueryRaise
                    • String ID: The required instruction sets are not supported by the current CPU.$StressLogLevel$TotalStressLogSize
                    • API String ID: 3403879507-2841289747
                    • Opcode ID: 82d5e33e1a75b53c9fbb5bab012175d66cbb518565e50815a25de26a1c9dfd7f
                    • Instruction ID: 825a4fd861f753902514990bbeeddbd3f645a701fd29cab6ba65a0b4259f6427
                    • Opcode Fuzzy Hash: 82d5e33e1a75b53c9fbb5bab012175d66cbb518565e50815a25de26a1c9dfd7f
                    • Instruction Fuzzy Hash: C7416E32E886C3C1E644BB68E8816B9E391BF41744FE84071EA4D976BADF2CE405C721

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1016 7ff78b9554e0-7ff78b95550d 1017 7ff78b955548 1016->1017 1018 7ff78b95550f-7ff78b955515 1016->1018 1019 7ff78b955517-7ff78b95551c 1018->1019 1020 7ff78b955543-7ff78b955566 1018->1020 1019->1020 1021 7ff78b95551e-7ff78b95553a 1019->1021 1024 7ff78b955568-7ff78b955570 1020->1024 1025 7ff78b9555df-7ff78b9555e4 1020->1025 1021->1017 1023 7ff78b95553c-7ff78b95553f 1021->1023 1023->1020 1028 7ff78b9555da call 7ff78b952ce0 1024->1028 1029 7ff78b955572-7ff78b955579 1024->1029 1026 7ff78b9555e6-7ff78b9555fa call 7ff78b95b980 RaiseFailFastException 1025->1026 1027 7ff78b9555ff-7ff78b955622 1025->1027 1026->1027 1030 7ff78b955624-7ff78b95562a call 7ff78b955370 1027->1030 1031 7ff78b95562f-7ff78b955639 1027->1031 1028->1025 1029->1028 1034 7ff78b95557b-7ff78b955586 1029->1034 1030->1031 1035 7ff78b9555a7-7ff78b9555b1 1034->1035 1036 7ff78b955588 1034->1036 1040 7ff78b9555b3-7ff78b9555b7 1035->1040 1041 7ff78b9555d1-7ff78b9555d3 1035->1041 1039 7ff78b955590-7ff78b9555a5 Sleep 1036->1039 1039->1035 1039->1039 1043 7ff78b9555b9-7ff78b9555c1 RaiseFailFastException 1040->1043 1044 7ff78b9555c6 1040->1044 1041->1028 1043->1044 1044->1041
                    APIs
                    Strings
                    • Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code., xrefs: 00007FF78B9555E6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: ExceptionFailFastRaise$Sleep
                    • String ID: Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code.
                    • API String ID: 3706814929-926682358
                    • Opcode ID: 24fe811f686bbb4834d6a3b880013902d716c1d808400b7a0a2472452d19c6de
                    • Instruction ID: 0127b7a3da4c747020e2dd0976d642db8e490b40adcf2b5866fe55e0cf10e8a3
                    • Opcode Fuzzy Hash: 24fe811f686bbb4834d6a3b880013902d716c1d808400b7a0a2472452d19c6de
                    • Instruction Fuzzy Hash: CF413D32A59A82C2EB94AF1DE484769B3A1FB04784FE84035DA4D823B1DF3DF451C761

                    Control-flow Graph

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Thread$CloseCreateHandlePriorityResume
                    • String ID:
                    • API String ID: 3633986771-0
                    • Opcode ID: 2473f1295a42763cfd341b8cfd7a40992b87c44e5d7ed509368ee88b1d319611
                    • Instruction ID: 90bbffe0f11ac96f03e5c31364fadeb06bd7a8fd9bc5befe69d446e0a9308f0a
                    • Opcode Fuzzy Hash: 2473f1295a42763cfd341b8cfd7a40992b87c44e5d7ed509368ee88b1d319611
                    • Instruction Fuzzy Hash: 0EE06DE9E0570282EB14AF25E828736A350BF9EB95F985034CE5E06370EF3CD189C610

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1048 7ff78b960e30-7ff78b960e61 1049 7ff78b960e67-7ff78b960e82 GetCurrentProcess call 7ff78b9ba95e 1048->1049 1050 7ff78b960f1f-7ff78b960f3c GlobalMemoryStatusEx 1048->1050 1049->1050 1061 7ff78b960e88-7ff78b960e90 1049->1061 1052 7ff78b960fc2-7ff78b960fc5 1050->1052 1053 7ff78b960f42-7ff78b960f45 1050->1053 1057 7ff78b960fce-7ff78b960fd1 1052->1057 1058 7ff78b960fc7-7ff78b960fcb 1052->1058 1055 7ff78b960f47-7ff78b960f52 1053->1055 1056 7ff78b960fb1-7ff78b960fb4 1053->1056 1062 7ff78b960f5b-7ff78b960f6c 1055->1062 1063 7ff78b960f54-7ff78b960f59 1055->1063 1064 7ff78b960fb9-7ff78b960fbc 1056->1064 1065 7ff78b960fb6 1056->1065 1059 7ff78b960fdb-7ff78b960fde 1057->1059 1060 7ff78b960fd3-7ff78b960fd8 1057->1060 1058->1057 1066 7ff78b960fe8-7ff78b96100b call 7ff78b9bacf0 1059->1066 1067 7ff78b960fe0 1059->1067 1060->1059 1068 7ff78b960efa-7ff78b960eff 1061->1068 1069 7ff78b960e92-7ff78b960e98 1061->1069 1070 7ff78b960f70-7ff78b960f81 1062->1070 1063->1070 1064->1066 1071 7ff78b960fbe-7ff78b960fc0 1064->1071 1065->1064 1072 7ff78b960fe5 1067->1072 1078 7ff78b960f11-7ff78b960f14 1068->1078 1079 7ff78b960f01-7ff78b960f04 1068->1079 1073 7ff78b960e9a-7ff78b960e9f 1069->1073 1074 7ff78b960ea1-7ff78b960eb5 1069->1074 1076 7ff78b960f8a-7ff78b960f9e 1070->1076 1077 7ff78b960f83-7ff78b960f88 1070->1077 1071->1072 1072->1066 1080 7ff78b960eb9-7ff78b960eca 1073->1080 1074->1080 1082 7ff78b960fa2-7ff78b960fae 1076->1082 1077->1082 1078->1066 1085 7ff78b960f1a 1078->1085 1083 7ff78b960f0b-7ff78b960f0e 1079->1083 1084 7ff78b960f06-7ff78b960f09 1079->1084 1086 7ff78b960ecc-7ff78b960ed1 1080->1086 1087 7ff78b960ed3-7ff78b960ee7 1080->1087 1082->1056 1083->1078 1084->1078 1085->1072 1088 7ff78b960eeb-7ff78b960ef7 1086->1088 1087->1088 1088->1068
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CurrentGlobalMemoryProcessStatus
                    • String ID: @
                    • API String ID: 3261791682-2766056989
                    • Opcode ID: c50f9f1349a2f10861f7ecfcf3d9fa8d7e1c5a7709ec8babca00959837fe57fa
                    • Instruction ID: 4daa76ba98fcf599e1bf719cec7665dee523cbdd60c22ee1edd067666195d4ef
                    • Opcode Fuzzy Hash: c50f9f1349a2f10861f7ecfcf3d9fa8d7e1c5a7709ec8babca00959837fe57fa
                    • Instruction Fuzzy Hash: 5141F771B09B8681E956DA3A9191B39D552BF5EBC0FB8C631E90E22774FF3CE481C610

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1089 7ff78b992320-7ff78b992353 1090 7ff78b9923f1-7ff78b9923f3 1089->1090 1091 7ff78b992359-7ff78b992377 EnterCriticalSection 1089->1091 1092 7ff78b992402-7ff78b99240e call 7ff78b9616e0 1090->1092 1093 7ff78b9923f5-7ff78b9923fc 1090->1093 1094 7ff78b9923a0-7ff78b9923ab 1091->1094 1095 7ff78b992379-7ff78b99237c 1091->1095 1104 7ff78b992413-7ff78b992418 1092->1104 1093->1092 1098 7ff78b9923fe-7ff78b992400 1093->1098 1096 7ff78b9923b2-7ff78b9923c6 1094->1096 1097 7ff78b9923ad-7ff78b9923b0 1094->1097 1095->1096 1100 7ff78b99237e-7ff78b992399 1095->1100 1101 7ff78b9923cf-7ff78b9923e3 LeaveCriticalSection 1096->1101 1102 7ff78b9923c8 1096->1102 1097->1101 1103 7ff78b99245a-7ff78b992472 1098->1103 1100->1096 1105 7ff78b99239b-7ff78b99239e 1100->1105 1106 7ff78b9923e5 1101->1106 1107 7ff78b9923e8-7ff78b9923eb 1101->1107 1102->1101 1104->1103 1108 7ff78b99241a-7ff78b992422 1104->1108 1105->1101 1106->1107 1107->1090 1109 7ff78b9923ed-7ff78b9923ef 1107->1109 1108->1103 1110 7ff78b992424-7ff78b992441 EnterCriticalSection 1108->1110 1109->1103 1111 7ff78b992443 1110->1111 1112 7ff78b99244a-7ff78b992456 LeaveCriticalSection 1110->1112 1111->1112 1112->1103
                    APIs
                    • EnterCriticalSection.KERNEL32(?,00000000,00000001,00007FF78B97F9D9,?,?,?,?,?,00007FF78B98E9FF,?,?,?,00007FF78B9688C3), ref: 00007FF78B992360
                    • LeaveCriticalSection.KERNEL32(?,00000000,00000001,00007FF78B97F9D9,?,?,?,?,?,00007FF78B98E9FF,?,?,?,00007FF78B9688C3), ref: 00007FF78B9923D6
                    • EnterCriticalSection.KERNEL32(?,00000000,00000001,00007FF78B97F9D9,?,?,?,?,?,00007FF78B98E9FF,?,?,?,00007FF78B9688C3), ref: 00007FF78B99242B
                    • LeaveCriticalSection.KERNEL32(?,00000000,00000001,00007FF78B97F9D9,?,?,?,?,?,00007FF78B98E9FF,?,?,?,00007FF78B9688C3), ref: 00007FF78B992451
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3168844106-0
                    • Opcode ID: 2f26acfbe39efda905e31c116d58f05a84f1c8e613b3a673d8beab4140165067
                    • Instruction ID: e0b7dc88a2d8f33a8e0147166f268d49f017740c9c964065f32db6cb32a5ab1e
                    • Opcode Fuzzy Hash: 2f26acfbe39efda905e31c116d58f05a84f1c8e613b3a673d8beab4140165067
                    • Instruction Fuzzy Hash: 18315A61D0C692C2EA90BB2DE899779F358BF55780FF80136E94C462B1EE2CE485C371

                    Control-flow Graph

                    APIs
                    • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF78B97419F,?,?,?,00007FF78B981E7B), ref: 00007FF78B97406A
                    • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF78B97419F,?,?,?,00007FF78B981E7B), ref: 00007FF78B9740AC
                    • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF78B97419F,?,?,?,00007FF78B981E7B), ref: 00007FF78B9740D7
                    • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF78B97419F,?,?,?,00007FF78B981E7B), ref: 00007FF78B9740F8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3168844106-0
                    • Opcode ID: fad017503d982359f6b350fff991fd565ce6d91fee4a39b5e2a1188cb59f1a07
                    • Instruction ID: c91334391698cf66646d99731d4d0225e90dce1a91cd12030d20a7fa127d2cdc
                    • Opcode Fuzzy Hash: fad017503d982359f6b350fff991fd565ce6d91fee4a39b5e2a1188cb59f1a07
                    • Instruction Fuzzy Hash: 33212D61A5894281EB50AF5CE8987B4A394BF157E4FF80332C52C422F5EF6CA199C362

                    Control-flow Graph

                    APIs
                    • VirtualAlloc.KERNELBASE(?,?,?,?,00000000,00007FF78B9651C8,?,?,0000000A,00007FF78B964220,?,?,00000000,00007FF78B95DBB1), ref: 00007FF78B961707
                    • GetCurrentProcess.KERNEL32(?,?,?,?,00000000,00007FF78B9651C8,?,?,0000000A,00007FF78B964220,?,?,00000000,00007FF78B95DBB1), ref: 00007FF78B961727
                    • VirtualAllocExNuma.KERNEL32 ref: 00007FF78B961748
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: AllocVirtual$CurrentNumaProcess
                    • String ID:
                    • API String ID: 647533253-0
                    • Opcode ID: 50d61e69d9914c3b35ffaae00cb017ff4e997f9ad39ea175855d1aa7930a3df2
                    • Instruction ID: db7b07a31442ca95d8d8e97ffacfe4b605b03ec718ce4f1b2193e069e59a6f54
                    • Opcode Fuzzy Hash: 50d61e69d9914c3b35ffaae00cb017ff4e997f9ad39ea175855d1aa7930a3df2
                    • Instruction Fuzzy Hash: B5F0AFB1B086D182EB209B0AF40461AA760FB4ABD4F984139EF8C17B68DF3DD581CB10

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1388 7ff78b96759b-7ff78b9675c2 1390 7ff78b9675ce-7ff78b9675d8 1388->1390 1391 7ff78b9675c4-7ff78b9675c9 call 7ff78b973910 1388->1391 1393 7ff78b9675da-7ff78b9675e1 1390->1393 1394 7ff78b967625-7ff78b96762b 1390->1394 1391->1390 1395 7ff78b9676cb-7ff78b9676e6 call 7ff78b96d810 1393->1395 1396 7ff78b9675e7-7ff78b9675f8 1393->1396 1397 7ff78b96762d-7ff78b967632 call 7ff78b973910 1394->1397 1398 7ff78b967637-7ff78b967651 call 7ff78b992520 1394->1398 1407 7ff78b967576-7ff78b96758a call 7ff78b9925f0 1395->1407 1408 7ff78b9676ec-7ff78b9676ef 1395->1408 1396->1395 1400 7ff78b9675fe-7ff78b967610 GetTickCount64 1396->1400 1397->1398 1406 7ff78b967657-7ff78b967659 1398->1406 1398->1407 1400->1394 1404 7ff78b967612-7ff78b967620 1400->1404 1404->1395 1412 7ff78b96765b-7ff78b967665 1406->1412 1413 7ff78b9676a7-7ff78b9676bd call 7ff78b990300 1406->1413 1409 7ff78b9674fa 1408->1409 1410 7ff78b9676f5-7ff78b967703 1408->1410 1419 7ff78b9674fc-7ff78b967515 1409->1419 1414 7ff78b967709-7ff78b96770c 1410->1414 1415 7ff78b967570-7ff78b967573 1410->1415 1412->1413 1417 7ff78b967667-7ff78b96766e 1412->1417 1423 7ff78b9676c2-7ff78b9676c5 1413->1423 1414->1409 1420 7ff78b967712-7ff78b967735 call 7ff78b96a000 1414->1420 1415->1407 1417->1395 1422 7ff78b967670-7ff78b967681 1417->1422 1420->1419 1422->1395 1425 7ff78b967683-7ff78b967695 GetTickCount64 1422->1425 1423->1395 1423->1407 1425->1413 1427 7ff78b967697-7ff78b9676a5 1425->1427 1427->1395
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Count64Tick
                    • String ID:
                    • API String ID: 1927824332-0
                    • Opcode ID: 809ad7372f923a6515913861ca92157f81363f84e760b70c066024c5668aa65f
                    • Instruction ID: fa91b2cc8c0168933383421f7ac554dad19c62ed9679a99bc3913126ffc738b5
                    • Opcode Fuzzy Hash: 809ad7372f923a6515913861ca92157f81363f84e760b70c066024c5668aa65f
                    • Instruction Fuzzy Hash: 31415C71E0C782C5FA64BB2DD548679E6A1BF0A784FF84436DD1D422B1DE3DE441C622

                    Control-flow Graph

                    APIs
                    • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF78B9BAC51,?,?,?,?,00007FF78B95FCD1,?,?,?,00007FF78B960254,00000000,00000020,?), ref: 00007FF78B9BB62A
                    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF78B9BB640
                      • Part of subcall function 00007FF78B9BB924: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF78B9BB92D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Concurrency::cancel_current_taskmallocstd::bad_alloc::bad_alloc
                    • String ID:
                    • API String ID: 205171174-0
                    • Opcode ID: a8f8c83a7ed87ce2d3b6738c234a410da243a5fab35cdf610d6bdacd798f5f2b
                    • Instruction ID: 5f90681324fb6ec9fe8082000371dff9d62e8ca719aac4d8292bac682d1b943e
                    • Opcode Fuzzy Hash: a8f8c83a7ed87ce2d3b6738c234a410da243a5fab35cdf610d6bdacd798f5f2b
                    • Instruction Fuzzy Hash: 6DE0EC00E099ABC1F96931AD14660B88140AF54774EBC1B38D93E442E3EF1CA856C130

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1443 7ff78b95ba40-7ff78b95ba62 CreateThread 1444 7ff78b95ba69-7ff78b95ba78 CloseHandle 1443->1444 1445 7ff78b95ba64-7ff78b95ba68 1443->1445
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CloseCreateHandleThread
                    • String ID:
                    • API String ID: 3032276028-0
                    • Opcode ID: afbd848b2ecd7790fe80cbff50474ccea25c37df90b3e86a6a037c059f69191f
                    • Instruction ID: d3c04963365d4308446bb76c7087ce974ea231bd579948ae1df457c10a4e816d
                    • Opcode Fuzzy Hash: afbd848b2ecd7790fe80cbff50474ccea25c37df90b3e86a6a037c059f69191f
                    • Instruction Fuzzy Hash: C1D012A5E09B8182DA14EF65680152667D1BB9DB44FD54038DA4DC3330FE3CD215C910
                    APIs
                      • Part of subcall function 00007FF78B992480: EnterCriticalSection.KERNEL32(?,?,?,00007FF78B977A69), ref: 00007FF78B9924C4
                      • Part of subcall function 00007FF78B992480: LeaveCriticalSection.KERNEL32(?,?,?,00007FF78B977A69), ref: 00007FF78B9924EE
                    • EnterCriticalSection.KERNEL32 ref: 00007FF78B977B43
                    • LeaveCriticalSection.KERNEL32 ref: 00007FF78B977B64
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3168844106-0
                    • Opcode ID: f2b6e7524cfd3a7049b78d530cb028a5667da698e63c4b036217a325343ed2f5
                    • Instruction ID: da0f68a8a94348ddc1830256ec7a462725d8bd25581339bffeb1e221d08e6be4
                    • Opcode Fuzzy Hash: f2b6e7524cfd3a7049b78d530cb028a5667da698e63c4b036217a325343ed2f5
                    • Instruction Fuzzy Hash: A8418B61A0968281EA14AF3DD944679A7A0BF05BF4FE80335DA7C876F4DF2CE041C3A4
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 54d16fb7520780bd85eec3c4bf88bb714ed96ad8374a8c3859c77b8b9086a31d
                    • Instruction ID: 2554e1e6306594bd01c139eb8fdc1ff16a252f5c671cb73e3d890c78470c89db
                    • Opcode Fuzzy Hash: 54d16fb7520780bd85eec3c4bf88bb714ed96ad8374a8c3859c77b8b9086a31d
                    • Instruction Fuzzy Hash: F931F132B05B92C1EA14EB1A958016AA3A4FB4ABD4FA48135DF4C17BA5DF38E462C350
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3168844106-0
                    • Opcode ID: 2bbfaa70841822840f390fb10a6491ea87be68f299496f59d245e6c0d776f768
                    • Instruction ID: 25ce2dc1c526ab32b7cb350b8e60003098955a08d342bd8a1ff4305ab7586b7b
                    • Opcode Fuzzy Hash: 2bbfaa70841822840f390fb10a6491ea87be68f299496f59d245e6c0d776f768
                    • Instruction Fuzzy Hash: 87019E21D0C69280F6A0B76CE8886B9F394BF513D0FF80131D55C425B1DE2CE495C361
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Virtual$AllocFree
                    • String ID:
                    • API String ID: 2087232378-0
                    • Opcode ID: c142b665c17b9829f30997f3f45fa6cc62ef321f650404eeabfbf3fa27cb0e2d
                    • Instruction ID: 575a0cb54588491b5cd4e9d4e11cd23a9d1d168e88536cc39c2b8b96ef38f841
                    • Opcode Fuzzy Hash: c142b665c17b9829f30997f3f45fa6cc62ef321f650404eeabfbf3fa27cb0e2d
                    • Instruction Fuzzy Hash: 50E0C2B8F1614186EB18A71BA845A266251BF5FB00FE48038C40D07370DE2DA25ACB20
                    APIs
                    • CoInitializeEx.OLE32(?,?,?,?,00000030,?,?,?,?,?,?,?,00007FF78B9F27CF,?,?,00000030), ref: 00007FF78B9F28E2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Initialize
                    • String ID:
                    • API String ID: 2538663250-0
                    • Opcode ID: d725e0b3d950bfd392393c993463a472c20741fc4ae74ea19a611fc2f3cf428b
                    • Instruction ID: 9ca38326cfa6fb036a973dbaa9823516dfb049714119b1a6552f45b6fed4c161
                    • Opcode Fuzzy Hash: d725e0b3d950bfd392393c993463a472c20741fc4ae74ea19a611fc2f3cf428b
                    • Instruction Fuzzy Hash: 2D219222F4C196D4F710F66AED516BEA290BF44358FB44035EE4D467A7EE2CE882C220
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug
                    • String ID:
                    • API String ID: 456121617-0
                    • Opcode ID: 3b1958921fa04c35c2a701cc9646c22b7e924147385864a8d091c62de11b65c9
                    • Instruction ID: 5beba5d6f729a1fd4c5e4d090fc6e990d0fbaf27798fb942da22fe95ca9fa25f
                    • Opcode Fuzzy Hash: 3b1958921fa04c35c2a701cc9646c22b7e924147385864a8d091c62de11b65c9
                    • Instruction Fuzzy Hash: 121105A3F1878182EA409A2594006A5A791BF8E7F0FA85331EE68436D6EF2CD442C750
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CurrentExceptionFailFastQueryRaiseThreadVirtual
                    • String ID:
                    • API String ID: 2131581837-0
                    • Opcode ID: d896b62f651088d1b42081c4ab7746b0ce5873f34015609dc32dcd43e3b187cf
                    • Instruction ID: a8ce521a5d340eb68719d5c5ea1781b6001033d2ad8375c8f07c145130f6c878
                    • Opcode Fuzzy Hash: d896b62f651088d1b42081c4ab7746b0ce5873f34015609dc32dcd43e3b187cf
                    • Instruction Fuzzy Hash: 05114C7290878282DA24AF29A44519AB760FB457B0FA48339E6BE477E6DF38D046C700
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Event
                    • String ID:
                    • API String ID: 4201588131-0
                    • Opcode ID: 452514a172d171043efb9d9a11994c3fb97cdc7e94a50651428492a93767d4e5
                    • Instruction ID: 0627828335497f8c449ac89a04a1c2e1df2c652bf8132bf5357bd44eac1a5c87
                    • Opcode Fuzzy Hash: 452514a172d171043efb9d9a11994c3fb97cdc7e94a50651428492a93767d4e5
                    • Instruction Fuzzy Hash: DAF05E25B5868282E6147739B9C267EA251AF497A0FA85130E91D067A7CE3CE481C750
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: FreeVirtual
                    • String ID:
                    • API String ID: 1263568516-0
                    • Opcode ID: e0e6f915b3e62b249a019bbc0d8d3fcc09be6c9d174bfcd050118d8529439d8d
                    • Instruction ID: 4e59cef007db397ec917c9f6eebfa3d87066afdb37e2d41bb1f768958f09d606
                    • Opcode Fuzzy Hash: e0e6f915b3e62b249a019bbc0d8d3fcc09be6c9d174bfcd050118d8529439d8d
                    • Instruction Fuzzy Hash: 7AB01284F16041C2E3043723BC4270901153B1BB02FD04024D608A1260CD1CC1A54B11
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BGCSpinCount$BreakOnOOM$CompactRatio$ConcurrentGC$ConfigLogEnabled$ConfigLogFile$ConservativeGC$ForceCompact$GCConfigLogFile$GCConserveMem$GCCpuGroup$GCDynamicAdaptationMode$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapAffinitizeRanges$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLargePages$GCLogFile$GCLowSkipRatio$GCName$GCNumaAware$GCProvModeStress$GCRegionRange$GCRegionSize$GCSpinCountUnit$GCTotalPhysicalMemory$Gen0Size$HeapCount$HeapVerifyLevel$LOHCompactionMode$LOHThreshold$LatencyLevel$LatencyMode$LogEnabled$LogFile$LogFileSize$MaxHeapCount$NoAffinitize$RetainVM$SegmentSize$ServerGC$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.DynamicAdaptationMode$System.GC.HeapAffinitizeMask$System.GC.HeapAffinitizeRanges$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LargePages$System.GC.MaxHeapCount$System.GC.Name$System.GC.NoAffinitize$System.GC.RetainVM$System.GC.Server
                    • API String ID: 0-799405152
                    • Opcode ID: 1ebbd9bada395e0ae796c2d8dd3961aa3f840e2442c0f16195dfd22ce20a116f
                    • Instruction ID: e1a06a983cb1a635efca4cd0438481451f9607975c27b3335f2ac71f27e2681e
                    • Opcode Fuzzy Hash: 1ebbd9bada395e0ae796c2d8dd3961aa3f840e2442c0f16195dfd22ce20a116f
                    • Instruction Fuzzy Hash: 19423071A18A9681EB20AB59F851EAAA3A4FF55BC8FD11132D98C07F34DF3CD206C715
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: strcmp
                    • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BGCSpinCount$GCBreakOnOOM$GCCompactRatio$GCConfigLogEnabled$GCConserveMemory$GCCpuGroup$GCDynamicAdaptationMode$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapCount$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLOHCompact$GCLOHThreshold$GCLargePages$GCLatencyLevel$GCLatencyMode$GCLogEnabled$GCLogFileSize$GCLowSkipRatio$GCMaxHeapCount$GCNoAffinitize$GCNumaAware$GCProvModeStress$GCRegionRange$GCRegionSize$GCRetainVM$GCSegmentSize$GCSpinCountUnit$GCTotalPhysicalMemory$GCWriteBarrier$GCgen0size$HeapVerify$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.DynamicAdaptationMode$System.GC.HeapAffinitizeMask$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LargePages$System.GC.MaxHeapCount$System.GC.NoAffinitize$System.GC.RetainVM$System.GC.Server$gcConcurrent$gcConservative$gcForceCompact$gcServer
                    • API String ID: 1004003707-1294421646
                    • Opcode ID: 8dd0dd815cfb6f9141113c6627f02b0dffcd85473cd5b48b1167f53c38f69273
                    • Instruction ID: a2183334465ff6e25c371fb36e6c6de88eb30cf9e2b2361af6154f63a1cc03ca
                    • Opcode Fuzzy Hash: 8dd0dd815cfb6f9141113c6627f02b0dffcd85473cd5b48b1167f53c38f69273
                    • Instruction Fuzzy Hash: 4662D560D1DA8794FB00FB6DAC888B2A7A0BF55784BE84176C45D47273EE3CA159C372
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug
                    • String ID:
                    • API String ID: 456121617-0
                    • Opcode ID: f3eca593082eef418b28c3d3d3ba6008102fd1d88324591edaa9422849b7c77f
                    • Instruction ID: e905d3326e123a3604895842a1b1314922a23a7417ef12d12c08f4c401b1fb28
                    • Opcode Fuzzy Hash: f3eca593082eef418b28c3d3d3ba6008102fd1d88324591edaa9422849b7c77f
                    • Instruction Fuzzy Hash: 23728322A096D2D2EA91AB29D0443BAE7A4FF45B94FE94135DE5D077F5EF3CE440C220
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Process$AllocCurrentTokenVirtual$AdjustCloseErrorHandleLargeLastLookupMinimumNumaOpenPagePrivilegePrivilegesValue
                    • String ID: SeLockMemoryPrivilege
                    • API String ID: 1752251271-475654710
                    • Opcode ID: a64ce78d6ed104d2b6db937a96794cdf395e2d8bd2e23d037bc090c5da09f6ca
                    • Instruction ID: cc528ab626a9dfcad1f967fca2eaf04168739605d3c6b25d9754d93bee5bbec0
                    • Opcode Fuzzy Hash: a64ce78d6ed104d2b6db937a96794cdf395e2d8bd2e23d037bc090c5da09f6ca
                    • Instruction Fuzzy Hash: A731D671A1C78286F720AB65F40876BA7A1FB49784FA01035DA4D07775DF3CD448C720
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: SwitchThread$BreakCounterDebugPerformanceQuery
                    • String ID: GCHeap::Promote: Promote GC Root *%p = %p MT = %pT$Concurrent GC: Restarting EE
                    • API String ID: 30421299-2108734148
                    • Opcode ID: c6c184d1560f85792b456f3718bb725fbe81c68e010fd342303592cee2957b30
                    • Instruction ID: d75bc57a5a1297c7acfa5387504c4b72a4f7f89f382818e0a49a92198b7a7f58
                    • Opcode Fuzzy Hash: c6c184d1560f85792b456f3718bb725fbe81c68e010fd342303592cee2957b30
                    • Instruction Fuzzy Hash: 31C29F62A09B86C5FA51AF2CD4547B8A7A0BF4AB94FF84236D94D537B1DF2CE441C320
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug$CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3888577265-0
                    • Opcode ID: d86f80d7bffd3d43e5ca74b6d9e1eaf02e16cc952f2289a23396a127ac85969b
                    • Instruction ID: ed393bfaf5c3321e53b9e4462f05f37d6ecf235b1df80224321f5fcabacc18f4
                    • Opcode Fuzzy Hash: d86f80d7bffd3d43e5ca74b6d9e1eaf02e16cc952f2289a23396a127ac85969b
                    • Instruction Fuzzy Hash: 071292A2A19BC6C1EA54AB19D454379A7A0FF84B84FF86935DA4D077B1DF3CE480C360
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug$CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3888577265-0
                    • Opcode ID: c44e6f749cf51194d18055909887b503eb6a2aff37391a8996bb50217290c366
                    • Instruction ID: bff851c28faa6eb59b3656ef92505d3431f598380f233f034c53b3cca7ce6507
                    • Opcode Fuzzy Hash: c44e6f749cf51194d18055909887b503eb6a2aff37391a8996bb50217290c366
                    • Instruction Fuzzy Hash: 2C028EB2A09B8286EB54AB29E544778B7A1FB44B94FE84139CE4D437B1DF3CE451C321
                    APIs
                    • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF78B9573A0), ref: 00007FF78B956B07
                    • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF78B9573A0), ref: 00007FF78B956C51
                    • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF78B9573A0), ref: 00007FF78B956D33
                    • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF78B9573A0), ref: 00007FF78B956D49
                    • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF78B9573A0), ref: 00007FF78B956DBE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: ExceptionFailFastRaise
                    • String ID: [ KeepUnwinding ]
                    • API String ID: 2546344036-400895726
                    • Opcode ID: 37b542edfd6e6a04d6d6af4a5e84d7cb03416debfb2b6644f32ce5e3f49ff12d
                    • Instruction ID: b61cbf9224f7b38d16b74b15df54f9e4133ed05507af6c7d74dd4482a803ff0f
                    • Opcode Fuzzy Hash: 37b542edfd6e6a04d6d6af4a5e84d7cb03416debfb2b6644f32ce5e3f49ff12d
                    • Instruction Fuzzy Hash: E4B19472A49B81C1EB949F29D4C16A9B3A5FB44B48FA84136CE4D873B8CF39E455C330
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: SwitchThread
                    • String ID:
                    • API String ID: 115865932-0
                    • Opcode ID: 1ddd28703dbe1c3b98edb21a237e8e30d6246af74f562787a6415a40b8681a1b
                    • Instruction ID: 9c2fb3b8f74ddb80d38b91399618d132d879292746843cd8aa672012a5f3b342
                    • Opcode Fuzzy Hash: 1ddd28703dbe1c3b98edb21a237e8e30d6246af74f562787a6415a40b8681a1b
                    • Instruction Fuzzy Hash: 07D191B2A086C5C5EB70AF19D440769B3A5FF85B94FA4413ADA5D47BA4DF3CE440C720
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug
                    • String ID:
                    • API String ID: 456121617-0
                    • Opcode ID: 24780f21546bd015505d40b07dff922e5db3dc92a0b137180c1451863a2d226f
                    • Instruction ID: 526fcd9075e9b0d6687140efffb6e2d4f2eac85d5192dcc2c4a072dfc956b67f
                    • Opcode Fuzzy Hash: 24780f21546bd015505d40b07dff922e5db3dc92a0b137180c1451863a2d226f
                    • Instruction Fuzzy Hash: 01E19C32A09A86C6EB10AF6DD458678A7E4FB44B94FE40236DA5D477B4DF3CE481C324
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BuffersFlushProcessWrite
                    • String ID:
                    • API String ID: 2982998374-0
                    • Opcode ID: 79d0f43756a16d64338861bbba21ee80fd32cc7b8ee7bde5ac8cae3f237e486d
                    • Instruction ID: 0c34a0ceac04164456b39203a5dd49ed33d2388ba1088ec7671ef8115af54001
                    • Opcode Fuzzy Hash: 79d0f43756a16d64338861bbba21ee80fd32cc7b8ee7bde5ac8cae3f237e486d
                    • Instruction Fuzzy Hash: 7F51D992A287C3C6EEB2AA7864503F99A98FF517D0FA98131CE6D577A1DE389540C310
                    APIs
                    • GetEnabledXStateFeatures.KERNEL32(?,?,?,?,?,00007FF78B954896,?,?,?,?,?,?,00007FF78B951EA0), ref: 00007FF78B960531
                    • GetEnabledXStateFeatures.KERNEL32(?,?,?,?,?,00007FF78B954896,?,?,?,?,?,?,00007FF78B951EA0), ref: 00007FF78B960590
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: EnabledFeaturesState
                    • String ID:
                    • API String ID: 1557480591-0
                    • Opcode ID: 6a010aaf3d9dfb2ad17c8b6f662b67376a88e00fe7fb95adbc059e65881bfa60
                    • Instruction ID: 51347f7064ceef92b91c4328263be3631242bf007784078ade73460db36b6d3c
                    • Opcode Fuzzy Hash: 6a010aaf3d9dfb2ad17c8b6f662b67376a88e00fe7fb95adbc059e65881bfa60
                    • Instruction Fuzzy Hash: 4351D332F0829686FF68545D94D93398283BBEA358FA546B8C94E536F1CD7FD842C224
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID: @
                    • API String ID: 0-2766056989
                    • Opcode ID: 6e82094639824c14ab4293de4ec13a988e764ae228435d9a0dabbc53190a5c10
                    • Instruction ID: 77c84f19db7ac4fc2b65fcb4a0dfd13ae7748f44e2b83809a1cfdc709ab7147d
                    • Opcode Fuzzy Hash: 6e82094639824c14ab4293de4ec13a988e764ae228435d9a0dabbc53190a5c10
                    • Instruction Fuzzy Hash: 4862F3B2A15B86C7E7089F2CC49576D73A5FB94B88F628035CA1D837A9DF38D910C790
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakCounterCreateDebugEventPerformanceQuery
                    • String ID:
                    • API String ID: 4239280443-0
                    • Opcode ID: 7fd523626d78e1805d7f233f5b92928f0ce7fa870f10a9a77f8adbba03bb496b
                    • Instruction ID: 6d799c92bde596be44478012659cd64fe2e31537233cda1710aeef2c85e3d3de
                    • Opcode Fuzzy Hash: 7fd523626d78e1805d7f233f5b92928f0ce7fa870f10a9a77f8adbba03bb496b
                    • Instruction Fuzzy Hash: A7420E71D18B8289E711AB28F888678B3A4FF58744FF85239DA8C12775DF3CA191D721
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Count64Tick
                    • String ID:
                    • API String ID: 1927824332-0
                    • Opcode ID: d5b68029aa416122ce9160fa44b138e07519b76c0a8e0ce365ee1a4a9db7f319
                    • Instruction ID: ce74529c2a0992959d1597ab32bea13240e8d67959d6883b6e38e49a389aebc0
                    • Opcode Fuzzy Hash: d5b68029aa416122ce9160fa44b138e07519b76c0a8e0ce365ee1a4a9db7f319
                    • Instruction Fuzzy Hash: B6D1E172A0864686E754FF29C444B7EA7A1BB80B88FB55035DE0E476A1DF3CE881C761
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: cd09ef96d8f17e625544f5d09aacbfbf5b704350f56f2afae0a11c1b875b7772
                    • Instruction ID: ac8347f0d2790df9c814e13f1c537f34e47dad38b6a8d26add54b5761106fd22
                    • Opcode Fuzzy Hash: cd09ef96d8f17e625544f5d09aacbfbf5b704350f56f2afae0a11c1b875b7772
                    • Instruction Fuzzy Hash: 85428172A5CB86C6EA10AB1DE444679B7A1FB097A0FE44235EA6D477B1CF3CE450C321
                    Strings
                    • ========== ENDGC %d (gen = %lu, collect_classes = %lu) ===========}, xrefs: 00007FF78B97A256
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID: ========== ENDGC %d (gen = %lu, collect_classes = %lu) ===========}
                    • API String ID: 0-2256439813
                    • Opcode ID: 7cd4840d3d0a4d3bfe87a83f411545977ddd30e931889fd1db4b34f2a771d1f5
                    • Instruction ID: 793b9ee32b3baf13558f21e8ecb18810ae6016812fdcc4c440b4d11e9ea1a457
                    • Opcode Fuzzy Hash: 7cd4840d3d0a4d3bfe87a83f411545977ddd30e931889fd1db4b34f2a771d1f5
                    • Instruction Fuzzy Hash: FB428C31A09B86CAEA15AB1CD848769B7A0FF05B84FE84136DA4D07371EF3DE065C365
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID: ?
                    • API String ID: 0-1684325040
                    • Opcode ID: c36884137a1fbdc5629651c62ab30761a03d17dd0682946ebc7bc0764feb72a2
                    • Instruction ID: 0fb3e5b3d88c73ab3582d56472b6e2027ed4d8cc60c8f5889df042bd886c1b19
                    • Opcode Fuzzy Hash: c36884137a1fbdc5629651c62ab30761a03d17dd0682946ebc7bc0764feb72a2
                    • Instruction Fuzzy Hash: 3312C232A08A86C6EF10EB1DE44477AB3A5FB5AB94FA44231DA6D437A4DF3CE441C710
                    APIs
                    • GetSystemTimeAsFileTime.KERNEL32(?,?,?,00007FF78B954879,?,?,?,?,?,?,00007FF78B951EA0), ref: 00007FF78B9600FC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Time$FileSystem
                    • String ID:
                    • API String ID: 2086374402-0
                    • Opcode ID: b5b44fb1cfa246b99875fe13986ad365462ea6fd88d0f75c6747b66273541516
                    • Instruction ID: 2d26b7597a5b1caca96a8a2e26d28b3abc2717b7623c6ffa6f632fdf3f833d48
                    • Opcode Fuzzy Hash: b5b44fb1cfa246b99875fe13986ad365462ea6fd88d0f75c6747b66273541516
                    • Instruction Fuzzy Hash: 5D217C71E09B8286E790AF2DE885669B3A0FB88744FE84139E54D43372DF7CE440C762
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CounterPerformanceQuery
                    • String ID:
                    • API String ID: 2783962273-3916222277
                    • Opcode ID: 0f497518f3011c90386f56ae0dd19987edc3a4fef3325d72aee3a22fc2e24883
                    • Instruction ID: 802f4edb9d02da8ecf42fec24d1d6b598dced6d1db7d74bbb89f975c314d631c
                    • Opcode Fuzzy Hash: 0f497518f3011c90386f56ae0dd19987edc3a4fef3325d72aee3a22fc2e24883
                    • Instruction Fuzzy Hash: 61D1C262A08A86C2EA10AF69E444679F3E1FB45BA4FA44331DA6D137F5DF3CE451C324
                    APIs
                    • GetLocaleInfoEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF78B9E90F0
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: InfoLocale
                    • String ID:
                    • API String ID: 2299586839-0
                    • Opcode ID: 631e051c7e85c708eee405e58e5ac8c33c0e023327227dff62814852cabaa958
                    • Instruction ID: 5c6df63a15e000cb2771e4ab4adfe60c80090d5144ddf0ce381b458d05f18381
                    • Opcode Fuzzy Hash: 631e051c7e85c708eee405e58e5ac8c33c0e023327227dff62814852cabaa958
                    • Instruction Fuzzy Hash: 49011833F046A09DF761EBE5AC40ADD77B5BB48358FA0402ADE0DA6A58DF349896C700
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3fa54e4b404b83b64a3ef684d3fa7d9e7b579a293c5d3786dac23140140fd01d
                    • Instruction ID: a389e0b9d1fde9ce53645f8b494b04e7e196f0c5b6980f6830fc156de6123eed
                    • Opcode Fuzzy Hash: 3fa54e4b404b83b64a3ef684d3fa7d9e7b579a293c5d3786dac23140140fd01d
                    • Instruction Fuzzy Hash: 508200B2A18785C7EB149B19E1803ADB7A1FB85780F648035DB4E83BA4DF3DE964C750
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fb96dbae57526de73ba5978f8db0fe2cb6513efdd4c95ed84dcb0dc29f55fb53
                    • Instruction ID: ad66b1299a19f0799c65b067593b7fa50e6d41cbcd8dda1da7971787fe9327e2
                    • Opcode Fuzzy Hash: fb96dbae57526de73ba5978f8db0fe2cb6513efdd4c95ed84dcb0dc29f55fb53
                    • Instruction Fuzzy Hash: B892BEA1B18B86C5EA11AF2DA858AB4E395BF45BC4FE88136D90E53371DF3CE445C321
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f1e24ba0ba6bef78217b93cc1824f39f4ffccc09ca148982d560d43c4ab6c4d9
                    • Instruction ID: bdb09a7e6e4c33d1ec788f4cc225ee43671b5fc7535f1478b9737c9ffc43fee0
                    • Opcode Fuzzy Hash: f1e24ba0ba6bef78217b93cc1824f39f4ffccc09ca148982d560d43c4ab6c4d9
                    • Instruction Fuzzy Hash: 3B82ADA2A08A82C5EB50AF2DE4446B9A3A5FF45788FE85136D90E133B0DF3DE455C361
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ae3399e1ef9d6b9ccce09df451620a2232e0225a6ba839f96d1aefac044876c6
                    • Instruction ID: 28dcc53eedb22f2ebb433c05271cb3d2883aea4efd1fb01879642a529a609847
                    • Opcode Fuzzy Hash: ae3399e1ef9d6b9ccce09df451620a2232e0225a6ba839f96d1aefac044876c6
                    • Instruction Fuzzy Hash: 2282DDB2B08B81C6EB10AF69E484679B7A5FB44B98FA44135DE4D53BA5CF3CE441C720
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bf5feb339442a0b79f58c974cad3d97fda4eb93d98ba6868e8e29d5f65b0f64f
                    • Instruction ID: 2c00fe98d7f39a6f6f56a8ccf0089a12c1710d2af1dceccffe444a7e8d3dbd00
                    • Opcode Fuzzy Hash: bf5feb339442a0b79f58c974cad3d97fda4eb93d98ba6868e8e29d5f65b0f64f
                    • Instruction Fuzzy Hash: 085240A2A15BD6C2EEA59F1CC044378A7E0FF55BA4FA85235CE6C033E4DF68E490C214
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b492ad88cf215fc62258aba1709844d5f27e408f569c58da072858a9a9ad3981
                    • Instruction ID: 04263d919eb4d0c3f313632a8d1fd0935e1712b2811a6b86e6aa5bd888e13321
                    • Opcode Fuzzy Hash: b492ad88cf215fc62258aba1709844d5f27e408f569c58da072858a9a9ad3981
                    • Instruction Fuzzy Hash: 6542C2B2B18B85C6EB10DF69E4401ADB7A1FB44B98FA40136DE4D57B68DE3CE449C710
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e52f450864030abe068b2e943946e6a8f68a43271c38fbddae6a16a12d04da61
                    • Instruction ID: 490b63cc56d467273da41e5130e4814e9f6a950cb471b3553077025f70cb808c
                    • Opcode Fuzzy Hash: e52f450864030abe068b2e943946e6a8f68a43271c38fbddae6a16a12d04da61
                    • Instruction Fuzzy Hash: EB42E6B2F08785C6EB10DF69D4006BCB7A2FB05788BA44536DE1D6B7A8DE38E055C360
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 456757d216aacf14f41c1d1ac0cd8049a835610a21c3933073f91090c7e01898
                    • Instruction ID: fadbd9bd3fe683e2ad9fa283cd82b00120f34cf8f781cd80a49a37693ceb9fa7
                    • Opcode Fuzzy Hash: 456757d216aacf14f41c1d1ac0cd8049a835610a21c3933073f91090c7e01898
                    • Instruction Fuzzy Hash: AC42A3A2B08A8A86EA50EF0DE444669B771FB41BD0FE95135DA4D877B8DF3CE059C310
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 58ab2ea6ff0a684350a52622f01339377179222e3f8cb1db98c70cb3a0ab0f85
                    • Instruction ID: 3c107bd543df7b3ca7db9caf846fa75d4adf7dedb849cb8dcb41a43bfe7f610f
                    • Opcode Fuzzy Hash: 58ab2ea6ff0a684350a52622f01339377179222e3f8cb1db98c70cb3a0ab0f85
                    • Instruction Fuzzy Hash: 4822F322A19FC589D617AB3990513B9E3D4BF567C4FA8C332ED4F22671EF29A153C210
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e10a91a420f83ef269157d36f9a2c016ddaa9393997882352c17c1d84d133b48
                    • Instruction ID: 15430d76233b07ca6c2e5acc3346b9d7435f758feaf723efe9b9917faf596934
                    • Opcode Fuzzy Hash: e10a91a420f83ef269157d36f9a2c016ddaa9393997882352c17c1d84d133b48
                    • Instruction Fuzzy Hash: 0D02AF72B04A518AEB25DF29D880AAC7770FB98B98FA09122DF4D63B65DF34D5C1C740
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CounterPerformanceQuery
                    • String ID:
                    • API String ID: 2783962273-0
                    • Opcode ID: af019d92b74d7be67137a52f9c77fda3c993f8b49f31bc8590fea9e3453cb08d
                    • Instruction ID: 16749b4ff84a942e0aa2c55ea9ad35579a30d188dc7ba861a575c8084bc25e7a
                    • Opcode Fuzzy Hash: af019d92b74d7be67137a52f9c77fda3c993f8b49f31bc8590fea9e3453cb08d
                    • Instruction Fuzzy Hash: AF02D3A2B14A89C6EA109B1DE4407B9B7A0FB45BA4FAC8235DA6D573F4DF3DE041C310
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 941236c64fb7aeb56a54193ab7823506ec3791b8a94ce74fac18868a71896ef1
                    • Instruction ID: e2b2ca7b3e5a71e0508dbb53d1a554cc41527634c87c64dccac787ff9f695c52
                    • Opcode Fuzzy Hash: 941236c64fb7aeb56a54193ab7823506ec3791b8a94ce74fac18868a71896ef1
                    • Instruction Fuzzy Hash: 90029F72A09A85C6EA14DF1DD4446B8B7A0BB45BA4FE44331DA6D477F1CE3CE441C324
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CurrentProcess
                    • String ID:
                    • API String ID: 2050909247-0
                    • Opcode ID: c0ad0a1e25142008f3637e5da2c3db878e0901c6b4a0cb550b565114e147fb9e
                    • Instruction ID: ea5c5ff196eb7ec065262685e85ae3f3168993bfa772423d7474d1824b17a779
                    • Opcode Fuzzy Hash: c0ad0a1e25142008f3637e5da2c3db878e0901c6b4a0cb550b565114e147fb9e
                    • Instruction Fuzzy Hash: 8002A0B1E0C68686FA15AB2DA848A39F7A1BF45781FF84636D44D13271EF3CB584C621
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 323b4a52389b31af78a198108c136ecd75e8293e50210e2468e6e8b2983b1f89
                    • Instruction ID: 476a206b339dec518dfe8b6bc5e1f0b1a190491621094fead9139dc16cef6293
                    • Opcode Fuzzy Hash: 323b4a52389b31af78a198108c136ecd75e8293e50210e2468e6e8b2983b1f89
                    • Instruction Fuzzy Hash: E7E104B2A08681C6EB11AB2DD448679BBA1FB45794FF84232DA1E577B0DF3CE441C320
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d78bf327fc7d401db98ee101711161cfb4b90b568116cb42030e1b04918fb35b
                    • Instruction ID: 62d0e94404ea8df9d52154d0944a0a19fb9d7cd9ad514ce32f9f6948f8dc6fdc
                    • Opcode Fuzzy Hash: d78bf327fc7d401db98ee101711161cfb4b90b568116cb42030e1b04918fb35b
                    • Instruction Fuzzy Hash: CED1D262B18B86C6EA10AF2DD4442B9B3A1FB55BA4FA49331CA6D077E5DF3CE041C354
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b12337283fe58a1ae982f19855bdc68314bb18f96eaedbf97d3c33e1d47e9e1d
                    • Instruction ID: 613814f3fe12cd074e7a5548d0f107fa8465dcee01850f619f41bfcf26f2512b
                    • Opcode Fuzzy Hash: b12337283fe58a1ae982f19855bdc68314bb18f96eaedbf97d3c33e1d47e9e1d
                    • Instruction Fuzzy Hash: AAD1D3A1A08A82C5EF10AB2DD4446B5A3A1FF44B94FE86236DD1E173B4DF3DE051C361
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c2b67d53944cb5c55e2bb92377965104f8c7736282132103d9110c3b3426bf77
                    • Instruction ID: fae00b1ab625b19a8c40dce0c239cbfa9bc7c3deb36850b3437fc1cbb5a52769
                    • Opcode Fuzzy Hash: c2b67d53944cb5c55e2bb92377965104f8c7736282132103d9110c3b3426bf77
                    • Instruction Fuzzy Hash: 7CE16BB2A08B86C5EB20AF19D444778A3E4FB44B98FE80636DA5C477A5DF3CE450C325
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 20d7dac9d533b3180a345ae923d8f6c9575024258e8af4de554390141a09baf3
                    • Instruction ID: d41fb193481143e08e361ffdab8ddb8a8644090e181fb41d1edb3e5e550bb60f
                    • Opcode Fuzzy Hash: 20d7dac9d533b3180a345ae923d8f6c9575024258e8af4de554390141a09baf3
                    • Instruction Fuzzy Hash: DAC1CFB2A08786C6EB11AB29D448A79BBA6FB457C4FE54136DA0E53771DF3CE441C320
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 98840326572346ce62672058949bdb619bd28472bb45fe13b568a26b56bb2989
                    • Instruction ID: 59bae2626af46b17a59d23f6cdcb365fa764ba4b692d9459befada4415b9ad9b
                    • Opcode Fuzzy Hash: 98840326572346ce62672058949bdb619bd28472bb45fe13b568a26b56bb2989
                    • Instruction Fuzzy Hash: C8C14132A09AC6C2E650AF2DE8446B9B3E4FB4A748FE80135DA4E57275DF3CE451C321
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3795db95c44060b19ab420451e6778c024f51e6a69577f27822aa931ae8f4db8
                    • Instruction ID: d543ad1361db34b335882c6ae571b8213fa021cb7ae1c10b879f1ae755df0eaa
                    • Opcode Fuzzy Hash: 3795db95c44060b19ab420451e6778c024f51e6a69577f27822aa931ae8f4db8
                    • Instruction Fuzzy Hash: A1C1A032A08A86C1EA50EF1DE848578B3A5FB457A0FE84236D96D477B0DF3DE451C325
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: eed20e039dcc1a7adb761facd62eb612643325d2ef7b125a1d3c58e3026f862f
                    • Instruction ID: 35401ff98f043aeafdaca7393aed604acf39cf6d9f22c59e28260c3772f4d19c
                    • Opcode Fuzzy Hash: eed20e039dcc1a7adb761facd62eb612643325d2ef7b125a1d3c58e3026f862f
                    • Instruction Fuzzy Hash: 89A1B76794D251C5E755EB2BA410B7AE6E0FB84B94FA04031EE8D077A4DF7CE482CB11
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6f495caaedb7263532d1806f88f0ff8ac8a82c62e595ec08781830e007608e81
                    • Instruction ID: 25cd1d795d76ed98d5b87ddb2df05674980c100634471db2ae8639ebd6f87715
                    • Opcode Fuzzy Hash: 6f495caaedb7263532d1806f88f0ff8ac8a82c62e595ec08781830e007608e81
                    • Instruction Fuzzy Hash: CBC17171A18B87C2EA51AB0DE844578B3A5FF457A0BE84236D9AD477B4DF3CE050C321
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e8839e0e3ad3752fbee51db35c45455f694ce765d77fd982f1e164920b5e77ec
                    • Instruction ID: e6e4dcfe8f8224ef028278897fcd858352eb98fe215602d5aa7e7072e667e934
                    • Opcode Fuzzy Hash: e8839e0e3ad3752fbee51db35c45455f694ce765d77fd982f1e164920b5e77ec
                    • Instruction Fuzzy Hash: F4B1B1A2718A95C2EB00EF19E058778B3A5FB44BA4FA85636DA6D477E4DF3CE041C310
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 96fea93f446af114b9064da49687705947baa9860f6c7a3c23dd91d3fd028b50
                    • Instruction ID: cff324c11c345b9dd611f8e91c6c852d342945c4779d8485902405537b4a7048
                    • Opcode Fuzzy Hash: 96fea93f446af114b9064da49687705947baa9860f6c7a3c23dd91d3fd028b50
                    • Instruction Fuzzy Hash: 3591B051E29F8A89E917AB3D6455974D2967F627C1AF8C332D81F32670EF3CB082C121
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2a85621e283accacced8221b17d10a49faa8c26bd841f71e3662727ff5320864
                    • Instruction ID: c3fa6b26f8593e5c5022ea1494559c3b92b6c4e78a6a002d89b228d2776484e1
                    • Opcode Fuzzy Hash: 2a85621e283accacced8221b17d10a49faa8c26bd841f71e3662727ff5320864
                    • Instruction Fuzzy Hash: D791A562B09A9AC6EE14AB1DD44567CB7A0FB41BA0FEC4132DA1E477B4DE3DE045C310
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 79e7110b9251933381237f45dafbe83c08329d0dfb3fdd3f62539a26e3327acb
                    • Instruction ID: a9621fdbdcc5f7db242779d9a5d6e8f4e188a8b905c0ce0d6cac95185562e406
                    • Opcode Fuzzy Hash: 79e7110b9251933381237f45dafbe83c08329d0dfb3fdd3f62539a26e3327acb
                    • Instruction Fuzzy Hash: CB81C0A2B05A9A82EA00DB1DD444679B7A1FB45BA0FED4635DA2E473F4DE2DE441C320
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2a0a653bd8412369acd8b18e9d6f980586c5921261b9fc202eb3e07ecbb7d49b
                    • Instruction ID: fdf735a046cb40bf5493021fce16726ba67dfe2cf8fef7ce4c32634d39ed2925
                    • Opcode Fuzzy Hash: 2a0a653bd8412369acd8b18e9d6f980586c5921261b9fc202eb3e07ecbb7d49b
                    • Instruction Fuzzy Hash: 5FA15076A18A62C6F720AF29E8546BEA7A1FB49784FE40131CD8D43674EF3CE544C760
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 52f6d5e490fbb126a6ff7b1701bbe82b2d86a503b07016c15d5eb3855ba6564f
                    • Instruction ID: 75548c712475bf9c25ab34dba1781596f4e64a3680c3408b563147389990a674
                    • Opcode Fuzzy Hash: 52f6d5e490fbb126a6ff7b1701bbe82b2d86a503b07016c15d5eb3855ba6564f
                    • Instruction Fuzzy Hash: BA81D2B3A14A85C7EB09DF2DC0907A873A5F788B94F958035CA0D87BA4DF38D641CB64
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 09f86d7bf020a1616741af4184dcfb5ba4b8671fe15046aec6e24d3f199e6ae6
                    • Instruction ID: 96009ec8aff96c7ff2db4ebd43d57ab51d04a5c8f104fafc24439e744a7578f5
                    • Opcode Fuzzy Hash: 09f86d7bf020a1616741af4184dcfb5ba4b8671fe15046aec6e24d3f199e6ae6
                    • Instruction Fuzzy Hash: 0C6104B7B11B8183D7089F2CC0D162D76A2FBD4B88BA68035CA1D837A9EF38D511C380
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8b7f31b7dde57376d23b91118050d515ff30093a1b7f5c396985b31bb123e795
                    • Instruction ID: f3204521fd0d3bb3f406db5ce799da30c8dd8c6897097177d5ef4292165f4138
                    • Opcode Fuzzy Hash: 8b7f31b7dde57376d23b91118050d515ff30093a1b7f5c396985b31bb123e795
                    • Instruction Fuzzy Hash: 26510822F1978E81ED0A977F5101679C5827F9A7D0EADCB31E90E327A1EF2DB091C614
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 24f9807a77ec1231628a5fee68b55ea91a59b695855e809c40b27073d2b7f48a
                    • Instruction ID: 7b7a775fcb5af3ead2d608c8397812eb65918d8a9d3e2401d87577b99888615f
                    • Opcode Fuzzy Hash: 24f9807a77ec1231628a5fee68b55ea91a59b695855e809c40b27073d2b7f48a
                    • Instruction Fuzzy Hash: 49512962A3C17142DB388B1CA412E3DE292FB95741F909335E6AE55EA1E72ED181DB10
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c1d6c5c74579766a181c76732d0e982c6beea5bccfddb835f43d11907d24d000
                    • Instruction ID: d9bc95387d16b61bff9a40e23aa817fa5bcfac68a9cb7a04a89d03413040978b
                    • Opcode Fuzzy Hash: c1d6c5c74579766a181c76732d0e982c6beea5bccfddb835f43d11907d24d000
                    • Instruction Fuzzy Hash: C261E322B25FC9C9D916DB799050768D295BF567C0FA88332ED4F33760EB3DA192C214
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3c5e064a75470d3b12434700b37e535a9a449cf43c98d28f8e1c4881788e2503
                    • Instruction ID: 7334f1269c6e57315544ac76ad11f91eba0419f675b4a9878785cb27ba168b8e
                    • Opcode Fuzzy Hash: 3c5e064a75470d3b12434700b37e535a9a449cf43c98d28f8e1c4881788e2503
                    • Instruction Fuzzy Hash: 88510A22A096C19AD724EF6AD845AB9F7A0FF58B84FA84035FE4C83765EF38D545C310
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 037180d382d50411797ef5447beba6102d2d9aae5c3127ec27b5573139ad0381
                    • Instruction ID: b3a3890ea2946fdb45e7ab651a6fcfda466b8591d0348708c037c634d8c5d3aa
                    • Opcode Fuzzy Hash: 037180d382d50411797ef5447beba6102d2d9aae5c3127ec27b5573139ad0381
                    • Instruction Fuzzy Hash: 2B611732A68FC185D656DB2C9445D78E2AABF817C4BE89331ED4F62260DF3DA092C314
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8488435c80d20a63b5b51d94c773dc6c83ce4d876cdd784b59539f6ecbcefddf
                    • Instruction ID: eb08da24bb6693d3ec2e678f64fd20b4456b68cdb25beef34ab9ecf8d0189e6a
                    • Opcode Fuzzy Hash: 8488435c80d20a63b5b51d94c773dc6c83ce4d876cdd784b59539f6ecbcefddf
                    • Instruction Fuzzy Hash: 8A514461B08502D6EE64BB3ED854679A650BF94FC0FF44031DA0E477B5EE2DE846C312
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 096d27cd634f33b2b39273a113a3bfa11cc36e2ee31c477455c3f03cc6ef90c3
                    • Instruction ID: 9ac4981bf81a43828a65065fbb481cb1b341e58e0134f00a1bf3457e0cbfef4b
                    • Opcode Fuzzy Hash: 096d27cd634f33b2b39273a113a3bfa11cc36e2ee31c477455c3f03cc6ef90c3
                    • Instruction Fuzzy Hash: 7A61CEB2B18A9582DA00AF0DE4446A8B7B1FB45BE0FD95231DA6E877A4CF7CE444C350
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 28531a6797bb50e98dfc9a6ae1b5f79929bc6386de9e3fae4bdb5bd213b841f6
                    • Instruction ID: 372bb9546edcb8233d482abc1f2a1375625fa30d70a85c4f617e1a16407fa964
                    • Opcode Fuzzy Hash: 28531a6797bb50e98dfc9a6ae1b5f79929bc6386de9e3fae4bdb5bd213b841f6
                    • Instruction Fuzzy Hash: 2641F461E28B8A81E905A77EA985634D1527F5E7D0EB9C733D81E662E2FF2C6085C210
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9f371b7c663320aac0712d55089f2ff7daf330af024b6290ddde3f6ee4752e1a
                    • Instruction ID: 3877992d5c705cd71827caeedab1a323b577491f6ecec9c69a2e9155211f146d
                    • Opcode Fuzzy Hash: 9f371b7c663320aac0712d55089f2ff7daf330af024b6290ddde3f6ee4752e1a
                    • Instruction Fuzzy Hash: 21418C66B14B8A8AEA00DF0ED4445A8A3A1F748BC0FE95032DF1E97725DF3CE551C314
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ed14c80dd863059f2dff2c32daa8a57b105c1426a02afba91e4b980da70f0663
                    • Instruction ID: 593e4c01b0bcbacd21a913a5437f7c6f24d13b3167a992800b9d569b70881f1e
                    • Opcode Fuzzy Hash: ed14c80dd863059f2dff2c32daa8a57b105c1426a02afba91e4b980da70f0663
                    • Instruction Fuzzy Hash: B141AB32B04BA489E715CBB5E8406DD77B5FB98348F65812AEE8DA7A18DF34C592C700
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f369d52a6617cb0b410c6854dde9fc91c82fa898c3b7573e9b41fa6fd70f80a6
                    • Instruction ID: 11af5547b6f6c687abf1caa28267ea2963fed867ba26367fc5d11e2891b3866d
                    • Opcode Fuzzy Hash: f369d52a6617cb0b410c6854dde9fc91c82fa898c3b7573e9b41fa6fd70f80a6
                    • Instruction Fuzzy Hash: 1031A712F0815386EA54BA2E988197AD651BF88FC4FF48434ED1E877B6DE2CEC45C351
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3168844106-0
                    • Opcode ID: 84561d1d573fde311a2d707e79fc372032f8b9738f604961ab49bf565c1bdabe
                    • Instruction ID: 4b1a5087210ee25ed806f74fa38978a391180d85ec3918c4de54b8accb299c0a
                    • Opcode Fuzzy Hash: 84561d1d573fde311a2d707e79fc372032f8b9738f604961ab49bf565c1bdabe
                    • Instruction Fuzzy Hash: 9A21DD63B3819282FBA4AB7DA2D567F5391FB89780FD46030DF0E03A66DD1DD581C614
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 221cf158b9a98e13d59b20ce11f85cd83d7d464265b0073024cff9ca69588a45
                    • Instruction ID: d11862261cc6e2dc682d9c13d63217aa85fcbd916327e9a4ee2d5ec5cdcee0a5
                    • Opcode Fuzzy Hash: 221cf158b9a98e13d59b20ce11f85cd83d7d464265b0073024cff9ca69588a45
                    • Instruction Fuzzy Hash: F9110423B0528285E614BE2AE8815BEE711BF997D4FA88431DF0C4B7A5CE3CC481C360
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8062c5b0bfe5bc4dfaf79245516a6f0a8f2a6c954b61e061f0a9d370f9ed3bdd
                    • Instruction ID: 59e08b585a97e55f3ece35870250ae2544f30fa97903c57bde5ccdcc464d4964
                    • Opcode Fuzzy Hash: 8062c5b0bfe5bc4dfaf79245516a6f0a8f2a6c954b61e061f0a9d370f9ed3bdd
                    • Instruction Fuzzy Hash: BFF03000E0D08686F90CBA7B585A2BFD1612F97780EF46834E91D5B7A7DC1C941383A4
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 13412aaf4960266ba0ca3712be346c71a13c8dc86ffbd22705df66a78fb92546
                    • Instruction ID: 8b21acc53254e63959c1c373ad05e9cce7b5cfbc8e6e4a3cc14842706ea1f899
                    • Opcode Fuzzy Hash: 13412aaf4960266ba0ca3712be346c71a13c8dc86ffbd22705df66a78fb92546
                    • Instruction Fuzzy Hash: 2AE04800E4C18685E50CB6A6589A2FAD1512F56740FF45430AA1D57BB7DD1C9402C364
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e8fe89d949a41ba888f42414d67c881266776e3cb583dd9942f77cc6f741983c
                    • Instruction ID: 3a5f4a49dbe0c8a1d897291924a214266d741d70c6c1c8e53b5c7be1f9c3efa6
                    • Opcode Fuzzy Hash: e8fe89d949a41ba888f42414d67c881266776e3cb583dd9942f77cc6f741983c
                    • Instruction Fuzzy Hash: FFD0A700F5805A80EC047A274C594BAD1202F46FC0DF46030ED0EA7B76DD0CD403C354
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: _stricmp
                    • String ID: buddhist$calendar$dangi$gregorian$hebrew$islamic$islamic-umalqura$japanese$persian$roc
                    • API String ID: 2884411883-3649728362
                    • Opcode ID: 5c4252158990072a2c8dbf7d618486f637b8a275c6e4f6a82dc01d2d222f2064
                    • Instruction ID: 7b6b38ac88dc553fe7312e0033a00ac2210e42c7f065282de4b015fa3905a924
                    • Opcode Fuzzy Hash: 5c4252158990072a2c8dbf7d618486f637b8a275c6e4f6a82dc01d2d222f2064
                    • Instruction Fuzzy Hash: 53513B25A1C69391EA20AB1EE8147B5B390FF95B84FE16032DC4E46775EF7CE405D360
                    APIs
                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95C1DE
                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95C206
                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95C226
                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95C246
                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95C266
                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95C28A
                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95C2AE
                    • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95C2D2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: strcmp
                    • String ID: GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent
                    • API String ID: 1004003707-945519297
                    • Opcode ID: bd652d5be0480d2eb31566d04321b99b92d141b06253939b4d1c7caa1d773059
                    • Instruction ID: 9961d465a03f8c8028391a8834e08af75958142992e506a5e5b22cc8cf6328dd
                    • Opcode Fuzzy Hash: bd652d5be0480d2eb31566d04321b99b92d141b06253939b4d1c7caa1d773059
                    • Instruction Fuzzy Hash: 3B413B24A4D69280E950BB1DA9805B5D3A17F017F4FE84331D83D976F5EF2CE94AC361
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: ContextInitialize$AddressEnabledErrorFeaturesHandleLastModuleProcState
                    • String ID: InitializeContext2$kernel32.dll
                    • API String ID: 4102459504-3117029998
                    • Opcode ID: e77f088c307fc0a17c3d28dc70e9a10b3c65282c2b946d340e1bfc8863682b2c
                    • Instruction ID: f3ac8b561b3c50993a9c6cd72b3707580f65442eb27d80c536507878bc3774a5
                    • Opcode Fuzzy Hash: e77f088c307fc0a17c3d28dc70e9a10b3c65282c2b946d340e1bfc8863682b2c
                    • Instruction Fuzzy Hash: F4314C61A09B9682EA10AF59E48067AE390FF48BA0FE80435DD5D82774DF7CE486C721
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Thread$AddressContextErrorLastLibraryLoadProcResumeSuspend
                    • String ID: QueueUserAPC2$kernel32
                    • API String ID: 3714266957-4022151419
                    • Opcode ID: bc70cecf5c74af7520f56920f6343e2be3003b4f5f30e659a0aacf61ab6d3dce
                    • Instruction ID: da856c6cb2fe477855fdb2ffa55e45063bc47aa99b92d1414c046276d38f239f
                    • Opcode Fuzzy Hash: bc70cecf5c74af7520f56920f6343e2be3003b4f5f30e659a0aacf61ab6d3dce
                    • Instruction Fuzzy Hash: C8316660A48E8281EA50AF1DE48477AA391BF45BA4FE40230D96D86BF5EF2CE445C721
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fe6e69181591d6301f79addf1851dae84baba91a0e20fc1957c0ed45eea2809c
                    • Instruction ID: 15a280c8f0b0ab537c29fce8afe44b178ede76a3408f0d008477c0b3e9e9ecb0
                    • Opcode Fuzzy Hash: fe6e69181591d6301f79addf1851dae84baba91a0e20fc1957c0ed45eea2809c
                    • Instruction Fuzzy Hash: 09719C61A09B82C2EA50BF2995A46B9E7E4BF04B94FF80435DA5D077B6DF3CE440C364
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug
                    • String ID:
                    • API String ID: 456121617-0
                    • Opcode ID: 5d73b6675c1853df630bb6c88506b6e80ad5f9561737fbd2e3aae4c93d19f0ff
                    • Instruction ID: 30ad2b917c63bd27f045a0966615c62e82f525a103eef266ce02a8d879028e04
                    • Opcode Fuzzy Hash: 5d73b6675c1853df630bb6c88506b6e80ad5f9561737fbd2e3aae4c93d19f0ff
                    • Instruction Fuzzy Hash: 7951C822A096D2E5FA54BB69C0811BEF759FB45B94FE94136CA1D033B1EE3DE481C360
                    APIs
                    • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF78B991FB1,?,?,0000025447AC1670,00007FF78B9914E2), ref: 00007FF78B991E89
                    • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF78B991FB1,?,?,0000025447AC1670,00007FF78B9914E2), ref: 00007FF78B991EA1
                    • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF78B991FB1,?,?,0000025447AC1670,00007FF78B9914E2), ref: 00007FF78B991EB9
                    • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF78B991FB1,?,?,0000025447AC1670,00007FF78B9914E2), ref: 00007FF78B991ED7
                    • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF78B991FB1,?,?,0000025447AC1670,00007FF78B9914E2), ref: 00007FF78B991EFC
                    • DebugBreak.KERNEL32 ref: 00007FF78B991F30
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug
                    • String ID:
                    • API String ID: 456121617-0
                    • Opcode ID: eb5a1da3c55d9acfe23894c72031d4decde521b88f1bcb182cc320728f4e60f2
                    • Instruction ID: ab2a3d3e91f1e8fbbd5391c1ba8d909341cb111b10863181108612fb56a4e9d5
                    • Opcode Fuzzy Hash: eb5a1da3c55d9acfe23894c72031d4decde521b88f1bcb182cc320728f4e60f2
                    • Instruction Fuzzy Hash: 53419422A096D1D1E791BBB9908017EEB99BF45B94FA80075DE4D067B6DE3CD880C3B1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: Current$Thread$DuplicateExceptionFailFastHandleProcessQueryRaiseVirtual
                    • String ID:
                    • API String ID: 510365852-3916222277
                    • Opcode ID: 9ced71184ac91c8616e97de7930c93111042d63eeb25a1540481694c845d8b19
                    • Instruction ID: 22e5da2aa284e68f948d71280efc35488f4d604868d3dd908359ad73e19fdcda
                    • Opcode Fuzzy Hash: 9ced71184ac91c8616e97de7930c93111042d63eeb25a1540481694c845d8b19
                    • Instruction Fuzzy Hash: 43114F72A08BC1CAD760EF19A48129AB761FB447B4F644335E6BD4BAE6CF78D442C700
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3168844106-0
                    • Opcode ID: 30c2a865ca8bebd16377ec9e55b12350cbbdee7e357ec5e7fec82702041c0912
                    • Instruction ID: 227ef51533548fb3a96c23a735510f8d3f0069ed56203bffed833019b1fb9668
                    • Opcode Fuzzy Hash: 30c2a865ca8bebd16377ec9e55b12350cbbdee7e357ec5e7fec82702041c0912
                    • Instruction Fuzzy Hash: DD613D61A1CB82C5EA50AB19E8887B5E3A4BF857D0FF80135D99C472B5EF3CE149C361
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3168844106-0
                    • Opcode ID: 7f292bd782e5db76287a58f2738b6682abde35b80ac547e9518716b401c7d407
                    • Instruction ID: e0ba7def3b55b109ebf8f4b5ea4159d3f0b1ea1bfcebd8d560b92735320f467d
                    • Opcode Fuzzy Hash: 7f292bd782e5db76287a58f2738b6682abde35b80ac547e9518716b401c7d407
                    • Instruction Fuzzy Hash: 53510C7591CB8681EA50AB19E8887B6F3A4BF59790FE80136C98D43675FF3CE058C721
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: ExceptionFailFastRaise
                    • String ID: Process is terminating due to StackOverflowException.
                    • API String ID: 2546344036-2200901744
                    • Opcode ID: 58b8172ba6b01771502ef75aede6fef8a2add92a778c92d7e4719fbc0e8cd755
                    • Instruction ID: 5eb67eb8b8bc0012be1c08232cad8bee8a94c3561be42ab635f9d5eda418cdae
                    • Opcode Fuzzy Hash: 58b8172ba6b01771502ef75aede6fef8a2add92a778c92d7e4719fbc0e8cd755
                    • Instruction Fuzzy Hash: BA517225E8E682C1EE54AB1DD491278A3A0FB48B94FE85136DA1F877B0DF2DE455C320
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: SwitchThread
                    • String ID:
                    • API String ID: 115865932-0
                    • Opcode ID: 43a0589b976ba65fc858849c45dd8cb8d0f1c6ed62617d059feff9e61ea92c26
                    • Instruction ID: 9bfe3dba1bd5050fd6ed30f229c1f154a7d736a782bcf3dd33816af22920c835
                    • Opcode Fuzzy Hash: 43a0589b976ba65fc858849c45dd8cb8d0f1c6ed62617d059feff9e61ea92c26
                    • Instruction Fuzzy Hash: D3418632B09685C6EBA05E3AD04063DB294FB40B94FB89279D66E467B9DF3CE440C761
                    APIs
                    • DebugBreak.KERNEL32(?,00000000,?,00007FF78B96E7B5,?,?,00000001,00007FF78B97CA48), ref: 00007FF78B990F49
                    • DebugBreak.KERNEL32(?,00000000,?,00007FF78B96E7B5,?,?,00000001,00007FF78B97CA48), ref: 00007FF78B990F66
                    • DebugBreak.KERNEL32(?,00000000,?,00007FF78B96E7B5,?,?,00000001,00007FF78B97CA48), ref: 00007FF78B990F81
                    • DebugBreak.KERNEL32(?,00000000,?,00007FF78B96E7B5,?,?,00000001,00007FF78B97CA48), ref: 00007FF78B990F9A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug
                    • String ID:
                    • API String ID: 456121617-0
                    • Opcode ID: 1c7403b06a8287785738a1b79607cbfa0b74b256696118e6c96bd0e0f9b3bca9
                    • Instruction ID: 2572a1e9fffdc3d507e5062a0b08a93555cdea29f50d8799783919e1313f5508
                    • Opcode Fuzzy Hash: 1c7403b06a8287785738a1b79607cbfa0b74b256696118e6c96bd0e0f9b3bca9
                    • Instruction Fuzzy Hash: 7841E422A092C2C1EA916B68914077DFAA8FF04B54FB900B4DE9D073B1DE7CE481C360
                    APIs
                    • DebugBreak.KERNEL32(?,?,00000000,?,00007FF78B97B16E,?,?,-8000000000000000,00007FF78B98E9AE,?,?,?,00007FF78B9688C3), ref: 00007FF78B97F339
                    • DebugBreak.KERNEL32(?,?,00000000,?,00007FF78B97B16E,?,?,-8000000000000000,00007FF78B98E9AE,?,?,?,00007FF78B9688C3), ref: 00007FF78B97F356
                    • DebugBreak.KERNEL32(?,?,00000000,?,00007FF78B97B16E,?,?,-8000000000000000,00007FF78B98E9AE,?,?,?,00007FF78B9688C3), ref: 00007FF78B97F376
                    • DebugBreak.KERNEL32(?,?,00000000,?,00007FF78B97B16E,?,?,-8000000000000000,00007FF78B98E9AE,?,?,?,00007FF78B9688C3), ref: 00007FF78B97F399
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: BreakDebug
                    • String ID:
                    • API String ID: 456121617-0
                    • Opcode ID: fadf0de926549372bb38a711b3a869a02a71d20e7acaacbe5fadbf81d570d035
                    • Instruction ID: 9c8c103881e59edcaf6a149ea16bf0bc687163f26ca796eb47ba9c375784094e
                    • Opcode Fuzzy Hash: fadf0de926549372bb38a711b3a869a02a71d20e7acaacbe5fadbf81d570d035
                    • Instruction Fuzzy Hash: 22315E22609BC6C3EA64AF59A0803B9E6E4FF45BD4FA80035DA4D166A5DE3CE440C364
                    APIs
                    • WaitForMultipleObjectsEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF78B9553F1), ref: 00007FF78B95B554
                    • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF78B9553F1), ref: 00007FF78B95B55E
                    • CoWaitForMultipleHandles.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF78B9553F1), ref: 00007FF78B95B57D
                    • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF78B9553F1), ref: 00007FF78B95B591
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: ErrorLastMultipleWait$HandlesObjects
                    • String ID:
                    • API String ID: 2817213684-0
                    • Opcode ID: fb3803eab1f8f5efa5fb27e8f20969c784412db916d2e9a85c31db86b57d2910
                    • Instruction ID: 09e30f97c5783f8c2a95f16addb4ad7a22dfca20a6a7467b20e0dfd53b0a0c6d
                    • Opcode Fuzzy Hash: fb3803eab1f8f5efa5fb27e8f20969c784412db916d2e9a85c31db86b57d2910
                    • Instruction Fuzzy Hash: 04113031A1CA95C6D7285F2EF44052AF261FB89791FA44139FA8E87BA5CF3CD801CB50
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                    • String ID:
                    • API String ID: 2933794660-0
                    • Opcode ID: 41e4741397a1d2276859ccb546066f9b7c88a4a65b19eb4148268b3bcac57992
                    • Instruction ID: c7b16950dd522dc46d4d002c827ee93e32b74d61fbc5250cb560743d2f81b7ee
                    • Opcode Fuzzy Hash: 41e4741397a1d2276859ccb546066f9b7c88a4a65b19eb4148268b3bcac57992
                    • Instruction Fuzzy Hash: A4115A32B14F028AEB00DF64E8486B973A4FB19758F840E31EA6D427A4DF3CD195C350
                    APIs
                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF78B9BB963), ref: 00007FF78B9BC6A8
                    • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF78B9BB963), ref: 00007FF78B9BC6E9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: ExceptionFileHeaderRaise
                    • String ID: csm
                    • API String ID: 2573137834-1018135373
                    • Opcode ID: 29c9d3c2ced156e708d0624c64ac5506fb70f8574287197aa5be238856b2bc0e
                    • Instruction ID: 148245d179c10b7ed8fa53c935d66fc0dbd30d095388bb211ebacb5664698f3a
                    • Opcode Fuzzy Hash: 29c9d3c2ced156e708d0624c64ac5506fb70f8574287197aa5be238856b2bc0e
                    • Instruction Fuzzy Hash: 76116032618B81C2EB209F19F40466ABBE0FB88B84F684634DE8D07764DF3CC555CB00
                    APIs
                    • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,HeapVerify,00007FF78B95C313,?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95D08B
                    • strtoull.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,HeapVerify,00007FF78B95C313,?,?,?,00007FF78B962967,?,?,?,?,00007FF78B95B845), ref: 00007FF78B95D0C8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: _stricmpstrtoull
                    • String ID: HeapVerify
                    • API String ID: 4031153986-2674988305
                    • Opcode ID: 3a336707b4a45596346e9791d434987ae1de577f78f4eb99a8291cf3e8841bd7
                    • Instruction ID: 42ca6f446cf0a79b79484e6446ed2a9a9a79b82770f4f6da3eb067e70d84badb
                    • Opcode Fuzzy Hash: 3a336707b4a45596346e9791d434987ae1de577f78f4eb99a8291cf3e8841bd7
                    • Instruction Fuzzy Hash: C0015231A19A81D9E710BF26E98047DF3A4FB597C0FA49135DA5D43B69CF3CD442D620
                    APIs
                    • EnterCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF78B96D6BF,01FFF001,00000000,00000000,00007FF78B97BD4F), ref: 00007FF78B9832ED
                    • LeaveCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF78B96D6BF,01FFF001,00000000,00000000,00007FF78B97BD4F), ref: 00007FF78B98333E
                    • EnterCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF78B96D6BF,01FFF001,00000000,00000000,00007FF78B97BD4F), ref: 00007FF78B983374
                    • LeaveCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF78B96D6BF,01FFF001,00000000,00000000,00007FF78B97BD4F), ref: 00007FF78B98338F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1697284093.00007FF78B951000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF78B950000, based on PE: true
                    • Associated: 00000000.00000002.1697267552.00007FF78B950000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697356399.00007FF78BA39000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697390858.00007FF78BA6A000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD1000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BAD7000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697443316.00007FF78BADC000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.1697528084.00007FF78BADF000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff78b950000_rPROFORMAINVOICE-PO_ATS_1036.jbxd
                    Similarity
                    • API ID: CriticalSection$EnterLeave
                    • String ID:
                    • API String ID: 3168844106-0
                    • Opcode ID: e743cea26d5aa4e05b231aa46b4469101279d7ee653fa58b53f11e4b04d877f5
                    • Instruction ID: 091b810a0f58bf1507e31f6404f1e16f9d27fa3e7b20d1b226bd5e7be8985ec2
                    • Opcode Fuzzy Hash: e743cea26d5aa4e05b231aa46b4469101279d7ee653fa58b53f11e4b04d877f5
                    • Instruction Fuzzy Hash: 74419D71A4C682C1EA10AB29E448775F350FB49BD4FE80232E95D47AB5DF3CE155C361

                    Execution Graph

                    Execution Coverage:4.5%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:20
                    Total number of Limit Nodes:2
                    execution_graph 15414 ff2268 15417 ff22ac SetWindowsHookExW 15414->15417 15416 ff22f2 15417->15416 15418 ff7120 15419 ff7166 GetCurrentProcess 15418->15419 15421 ff71b8 GetCurrentThread 15419->15421 15422 ff71b1 15419->15422 15423 ff71f5 GetCurrentProcess 15421->15423 15425 ff71ee 15421->15425 15422->15421 15424 ff722b 15423->15424 15430 ff72f1 15424->15430 15434 ff7300 15424->15434 15425->15423 15426 ff7253 GetCurrentThreadId 15427 ff7284 15426->15427 15431 ff7300 15430->15431 15437 ff6cec 15431->15437 15435 ff6cec DuplicateHandle 15434->15435 15436 ff732e 15435->15436 15436->15426 15438 ff7368 DuplicateHandle 15437->15438 15439 ff732e 15438->15439 15439->15426

                    Control-flow Graph

                    APIs
                    • GetCurrentProcess.KERNEL32 ref: 00FF719E
                    • GetCurrentThread.KERNEL32 ref: 00FF71DB
                    • GetCurrentProcess.KERNEL32 ref: 00FF7218
                    • GetCurrentThreadId.KERNEL32 ref: 00FF7271
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246803385.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_ff0000_MSBuild.jbxd
                    Similarity
                    • API ID: Current$ProcessThread
                    • String ID:
                    • API String ID: 2063062207-0
                    • Opcode ID: 2fa3978cde1d6635190e006d657b81bc50f4ad84c9a99f3560624ec53a61ec45
                    • Instruction ID: 495c745060da26cd25c5dfd7620a2d18f39f27b67aae0564e9fcf1319b028e50
                    • Opcode Fuzzy Hash: 2fa3978cde1d6635190e006d657b81bc50f4ad84c9a99f3560624ec53a61ec45
                    • Instruction Fuzzy Hash: C75154B09017098FDB04DFA9D948BAEFBF1AF88314F208469E458A7360DB74A945CF65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 24 ff7120-ff71af GetCurrentProcess 28 ff71b8-ff71ec GetCurrentThread 24->28 29 ff71b1-ff71b7 24->29 30 ff71ee-ff71f4 28->30 31 ff71f5-ff7229 GetCurrentProcess 28->31 29->28 30->31 33 ff722b-ff7231 31->33 34 ff7232-ff724a 31->34 33->34 45 ff724d call ff72f1 34->45 46 ff724d call ff7300 34->46 36 ff7253-ff7282 GetCurrentThreadId 38 ff728b-ff72ed 36->38 39 ff7284-ff728a 36->39 39->38 45->36 46->36
                    APIs
                    • GetCurrentProcess.KERNEL32 ref: 00FF719E
                    • GetCurrentThread.KERNEL32 ref: 00FF71DB
                    • GetCurrentProcess.KERNEL32 ref: 00FF7218
                    • GetCurrentThreadId.KERNEL32 ref: 00FF7271
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246803385.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_ff0000_MSBuild.jbxd
                    Similarity
                    • API ID: Current$ProcessThread
                    • String ID:
                    • API String ID: 2063062207-0
                    • Opcode ID: f4bdc18f2d0cba6a520598f9328d425ecd3042f2a1a53d71de008cd1bb80f703
                    • Instruction ID: a13d794920f17b1bc9ba0ae6531c77894dd5cad341f2da14f39ef468d89fdad5
                    • Opcode Fuzzy Hash: f4bdc18f2d0cba6a520598f9328d425ecd3042f2a1a53d71de008cd1bb80f703
                    • Instruction Fuzzy Hash: 745164B09017098FDB04DFA9D548BAEFBF1AF88314F208469E418A7360DB74A944CF65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 47 ff6cec-ff73fc DuplicateHandle 49 ff73fe-ff7404 47->49 50 ff7405-ff7422 47->50 49->50
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00FF732E,?,?,?,?,?), ref: 00FF73EF
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246803385.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_ff0000_MSBuild.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: fa29e6208173b22318ab252df7a2c936e473a896ab4be4ca68acec2b13bc07cc
                    • Instruction ID: b3a50625c0121aab1ce9f40204883c9f920bd6e1f0d927b48d61685109a8973c
                    • Opcode Fuzzy Hash: fa29e6208173b22318ab252df7a2c936e473a896ab4be4ca68acec2b13bc07cc
                    • Instruction Fuzzy Hash: 3721D4B5904358AFDB10DF9AD984AEEFBF4EB48310F14801AE914A7310D374A950DFA4

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 53 ff7360-ff7362 54 ff7368-ff73fc DuplicateHandle 53->54 55 ff73fe-ff7404 54->55 56 ff7405-ff7422 54->56 55->56
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00FF732E,?,?,?,?,?), ref: 00FF73EF
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246803385.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_ff0000_MSBuild.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 77271dc65b776f6d617f72f6178a3dbe1166d87ca88b53b88cb845486c23cabb
                    • Instruction ID: 710a570950037588f7b4dd8f4a1540fba135cd0a409d3c640bebd949fdccdb2e
                    • Opcode Fuzzy Hash: 77271dc65b776f6d617f72f6178a3dbe1166d87ca88b53b88cb845486c23cabb
                    • Instruction Fuzzy Hash: 9921E5B5901258AFDB10CF9AD984ADEFFF8EB48310F14801AE954B7310D374A944DF65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 59 ff2260-ff22b2 61 ff22be-ff22f0 SetWindowsHookExW 59->61 62 ff22b4 59->62 63 ff22f9-ff231e 61->63 64 ff22f2-ff22f8 61->64 65 ff22bc 62->65 64->63 65->61
                    APIs
                    • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00FF22E3
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246803385.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_ff0000_MSBuild.jbxd
                    Similarity
                    • API ID: HookWindows
                    • String ID:
                    • API String ID: 2559412058-0
                    • Opcode ID: aeb04a29d33d5b498ab21b15c5936a5206be89f7541a25cfdd625070b10b7839
                    • Instruction ID: b9c1cd9fb8f1a868c75ee9f30a8b319d6c184efb5c2b2905cbdd1c424461adc8
                    • Opcode Fuzzy Hash: aeb04a29d33d5b498ab21b15c5936a5206be89f7541a25cfdd625070b10b7839
                    • Instruction Fuzzy Hash: 2C2135B1D002099FDB14CFA9C848BEEFBF5BF88320F10842AD458A7260C774A945CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 69 ff2268-ff22b2 71 ff22be-ff22f0 SetWindowsHookExW 69->71 72 ff22b4 69->72 73 ff22f9-ff231e 71->73 74 ff22f2-ff22f8 71->74 75 ff22bc 72->75 74->73 75->71
                    APIs
                    • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 00FF22E3
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246803385.0000000000FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FF0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_ff0000_MSBuild.jbxd
                    Similarity
                    • API ID: HookWindows
                    • String ID:
                    • API String ID: 2559412058-0
                    • Opcode ID: 4ecf56b0feb0b24db10f5e630226d90cf299d15fb4c010e7c749ecb39cfdc037
                    • Instruction ID: 8f92daa38b8172af73e385c05a6a20723938fd91a07265c924c94ab15e22d7f3
                    • Opcode Fuzzy Hash: 4ecf56b0feb0b24db10f5e630226d90cf299d15fb4c010e7c749ecb39cfdc037
                    • Instruction Fuzzy Hash: C62115B1D002199FDB14DF99C844BEEFBF5AF88320F108429D459A7260C774A944CFA5
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246543019.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_e8d000_MSBuild.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c127739b12a7868d9e7639ae9b2c78a3f3673afeaded819f9e42712cb0300677
                    • Instruction ID: 6e9da7c90d43f7a10ecace03f37eca2233ec963c4ac4b558889810c7dbd9bcf7
                    • Opcode Fuzzy Hash: c127739b12a7868d9e7639ae9b2c78a3f3673afeaded819f9e42712cb0300677
                    • Instruction Fuzzy Hash: D1210371548204DFDB05EF14D9C0B27BF65FB98318F20C56AE90D5A296C336D856CBA1
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246603973.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_e9d000_MSBuild.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3877ff12507d21717201ed82562113070356f6585860526f7decb43e6def1aa5
                    • Instruction ID: 5459037c8525f886e24b4918ec4dbe7390a122c3a4cfa757cc29b702bb872b1d
                    • Opcode Fuzzy Hash: 3877ff12507d21717201ed82562113070356f6585860526f7decb43e6def1aa5
                    • Instruction Fuzzy Hash: FB210472508204EFDF05DF15DDC4B26BBA5FB98318F20C56DD9095B296C33AD846CA61
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246543019.0000000000E8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E8D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_e8d000_MSBuild.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                    • Instruction ID: 416fb0fdd68967de8768a3c568325239386299781106fa6a3eb3d7435af5df05
                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                    • Instruction Fuzzy Hash: EC11AF76508244CFDB16DF10D9C4B16BF61FB94318F24C5AAD8094B256C336D85ACBA1
                    Memory Dump Source
                    • Source File: 00000002.00000002.3246603973.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_e9d000_MSBuild.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                    • Instruction ID: cb93a521afd92813a931ba5bdce490243dde3ee561124e2a0712932f0a35c2f8
                    • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                    • Instruction Fuzzy Hash: F011DD76508280DFDB06CF10D9C4B15BFB1FB84318F24C6AADC494B256C33AD84ACB61