Loading ...

Play interactive tourEdit tour

Analysis Report NEW_INVOICE.exe

Overview

General Information

Joe Sandbox Version:28.0.0 Lapis Lazuli
Analysis ID:1048170
Start date:24.01.2020
Start time:13:24:47
Joe Sandbox Product:Cloud
Overall analysis duration:0h 12m 28s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:NEW_INVOICE.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40 1.8.0_191, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:15
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.troj.spyw.evad.winEXE@14/10@2/1
EGA Information:
  • Successful, ratio: 50%
HDC Information:Failed
HCA Information:
  • Successful, ratio: 95%
  • Number of executed functions: 453
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
  • Adjusted system time to: 20/1/2020
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, conhost.exe, mscorsvw.exe
  • Excluded IPs from analysis (whitelisted): 192.35.177.64, 8.253.207.121, 8.248.123.254, 67.26.139.254, 8.248.141.254, 8.253.204.121, 13.107.4.50, 8.238.21.254, 67.26.111.254, 67.26.109.254, 8.238.20.254, 8.238.23.254
  • Excluded domains from analysis (whitelisted): au.au-msedge.net, audownload.windowsupdate.nsatc.net, apps.digsigtrust.com, ctldl.windowsupdate.com, c-0001.c-msedge.net, au.c-0001.c-msedge.net, auto.au.download.windowsupdate.com.c.footprint.net, apps.identrust.com
  • Execution Graph export aborted for target SjKMY.exe, PID 2900 because it is empty
  • Execution Graph export aborted for target SjKMY.exe, PID 3300 because it is empty
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Detection

StrategyScoreRangeReportingWhitelistedThreatDetection
Threshold1000 - 100Report FP / FNfalse
AgentTesla
malicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample has functionality to log and monitor keystrokes, analyze it with the 'Simulates keyboard and window changes' cookbook
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")



Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation221Registry Run Keys / Startup Folder1Access Token Manipulation1Software Packing3Credential Dumping2Account Discovery1Remote File Copy1Data from Local System2Data Encrypted1Commonly Used Port1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Replication Through Removable MediaCommand-Line Interface3Hidden Files and Directories1Process Injection212Disabling Security Tools1Input Capture11Security Software Discovery231Remote ServicesEmail Collection1Exfiltration Over Other Network MediumRemote File Copy1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
External Remote ServicesScheduled Task1Scheduled Task1Scheduled Task1Obfuscated Files or Information2Credentials in Registry1File and Directory Discovery2Windows Remote ManagementInput Capture11Automated ExfiltrationStandard Cryptographic Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Drive-by CompromiseScheduled TaskSystem FirmwareDLL Search Order HijackingMasquerading1Credentials in FilesSystem Information Discovery114Logon ScriptsClipboard Data1Data EncryptedStandard Non-Application Layer Protocol1SIM Card SwapPremium SMS Toll Fraud
Exploit Public-Facing ApplicationCommand-Line InterfaceShortcut ModificationFile System Permissions WeaknessHidden Files and Directories1Account ManipulationQuery Registry1Shared WebrootData StagedScheduled TransferStandard Application Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
Spearphishing LinkGraphical User InterfaceModify Existing ServiceNew ServiceVirtualization/Sandbox Evasion14Brute ForceVirtualization/Sandbox Evasion14Third-party SoftwareScreen CaptureData Transfer Size LimitsCommonly Used PortJamming or Denial of ServiceAbuse Accessibility Features
Spearphishing AttachmentScriptingPath InterceptionScheduled TaskAccess Token Manipulation1Two-Factor Authentication InterceptionProcess Discovery2Pass the HashEmail CollectionExfiltration Over Command and Control ChannelUncommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Spearphishing via ServiceThird-party SoftwareLogon ScriptsProcess InjectionProcess Injection212Bash HistorySystem Owner/User Discovery1Remote Desktop ProtocolClipboard DataExfiltration Over Alternative ProtocolStandard Application Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
Supply Chain CompromiseRundll32DLL Search Order HijackingService Registry Permissions WeaknessProcess InjectionInput PromptRemote System Discovery1Windows Admin SharesAutomated CollectionExfiltration Over Physical MediumMultilayer EncryptionRogue Cellular Base StationData Destruction

Signature Overview

Click to jump to signature section


AV Detection:

barindex
Antivirus detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeAvira: detection malicious, Label: TR/Dropper.MSIL.ugaix
Source: C:\Users\user\AppData\Roaming\lNzSaUcIhlGHF.exeAvira: detection malicious, Label: TR/Dropper.MSIL.ugaix
Antivirus detection for sampleShow sources
Source: NEW_INVOICE.exeAvira: detection malicious, Label: TR/Dropper.MSIL.ugaix
Found malware configurationShow sources
Source: SjKMY.exe.2900.13.memstrMalware Configuration Extractor: Agenttesla {"To: ": "rameshwar.raut@eminentleague.com", "ByHost:": "mail.eminentleague.com:587", "From: ": "rameshwar.raut@eminentleague.com"}
Multi AV Scanner detection for submitted fileShow sources
Source: NEW_INVOICE.exeVirustotal: Detection: 73%Perma Link
Machine Learning detection for dropped fileShow sources
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Roaming\lNzSaUcIhlGHF.exeJoe Sandbox ML: detected
Machine Learning detection for sampleShow sources
Source: NEW_INVOICE.exeJoe Sandbox ML: detected
Antivirus or Machine Learning detection for unpacked fileShow sources
Source: 13.2.SjKMY.exe.270000.0.unpackAvira: Label: TR/Dropper.MSIL.ugaix
Source: 7.0.NEW_INVOICE.exe.1230000.0.unpackAvira: Label: TR/Dropper.MSIL.ugaix
Source: 8.0.SjKMY.exe.270000.0.unpackAvira: Label: TR/Dropper.MSIL.ugaix
Source: 13.0.SjKMY.exe.270000.0.unpackAvira: Label: TR/Dropper.MSIL.ugaix
Source: 13.2.SjKMY.exe.400000.2.unpackAvira: Label: TR/Dropper.Gen
Source: 1.0.NEW_INVOICE.exe.1230000.0.unpackAvira: Label: TR/Dropper.MSIL.ugaix
Source: 7.2.NEW_INVOICE.exe.1230000.6.unpackAvira: Label: TR/Dropper.MSIL.ugaix
Source: 7.2.NEW_INVOICE.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen

Spreading:

barindex
Enumerates the file systemShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

Networking:

barindex
Internet Provider seen in connection with other malwareShow sources
Source: Joe Sandbox ViewASN Name: unknown unknown
Contains functionality to download additional files from the internetShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_0027A09A recv,7_2_0027A09A
Found strings which match to known social media urlsShow sources
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: mail.eminentleague.com
Urls found in memory or binary dataShow sources
Source: E0F5C59F9FA661F6F4C50B87FEF3A15A.7.drString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c
Source: NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
Source: NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://cert.int-x3.letsencrypt.org/0
Source: NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://cps.letsencrypt.org0
Source: NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: NEW_INVOICE.exe, 00000007.00000002.595738085.04D40000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.602446126.04CD0000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: SjKMY.exe, 0000000D.00000002.602446126.04CD0000.00000004.00000001.sdmpString found in binary or memory: http://crl.useZ
Source: NEW_INVOICE.exe, 00000007.00000002.592342373.002C9000.00000004.00000020.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: NEW_INVOICE.exe, 00000007.00000002.592342373.002C9000.00000004.00000020.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: NEW_INVOICE.exe, 00000007.00000002.595764095.04D6A000.00000004.00000001.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab8
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabv
Source: NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://isrg.trustid.ocsp.identrust.com0;
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.int-x3.letsencrypt.orT
Source: NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.int-x3.letsencrypt.org0/
Source: NEW_INVOICE.exeString found in binary or memory: http://pi.hole/admin/
Source: NEW_INVOICE.exeString found in binary or memory: http://pi.hole/admin/5ManHole
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: SjKMY.exe, 0000000D.00000002.602446126.04CD0000.00000004.00000001.sdmpString found in binary or memory: http://www.usertrust.
Source: SjKMY.exe, SjKMY.exe, 0000000D.00000000.468616532.00272000.00000020.00020000.sdmp, NEW_INVOICE.exeString found in binary or memory: https://paypal.me/justinboughton
Source: NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: SjKMY.exe, 0000000D.00000002.600936606.01B80000.00000004.00000001.sdmpString found in binary or memory: https://v6745Ki5eOlpwSJ6UFt.org
Source: SjKMY.exe, 0000000D.00000002.600936606.01B80000.00000004.00000001.sdmpString found in binary or memory: https://v6745Ki5eOlpwSJ6UFt.orgH
Source: SjKMY.exe, NEW_INVOICE.exeString found in binary or memory: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=3J2L3Z4DHW9UY

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Installs a global keyboard hookShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\NEW_INVOICE.exeJump to behavior
Creates a window with clipboard capturing capabilitiesShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

E-Banking Fraud:

barindex
Drops certificate files (DER)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15AJump to dropped file

System Summary:

barindex
Initial sample is a PE file and has a suspicious nameShow sources
Source: initial sampleStatic PE information: Filename: NEW_INVOICE.exe
Contains functionality to call native functionsShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00ED0472 NtQuerySystemInformation,7_2_00ED0472
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00ED0441 NtQuerySystemInformation,7_2_00ED0441
Detected potential crypto functionShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_0078335F1_2_0078335F
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_00780A501_2_00780A50
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_007853F81_2_007853F8
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_007878D01_2_007878D0
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_007849D01_2_007849D0
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_00780A3F1_2_00780A3F
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_007878C11_2_007878C1
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00383C7D7_2_00383C7D
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF18E87_2_00EF18E8
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFB8F07_2_00EFB8F0
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF68787_2_00EF6878
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFBC407_2_00EFBC40
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF28347_2_00EF2834
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFE1D87_2_00EFE1D8
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF89207_2_00EF8920
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFC9307_2_00EFC930
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF3AF07_2_00EF3AF0
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF02F07_2_00EF02F0
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF96B87_2_00EF96B8
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFA6807_2_00EFA680
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFC2707_2_00EFC270
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF9F807_2_00EF9F80
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF53657_2_00EF5365
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFB8E07_2_00EFB8E0
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF88F27_2_00EF88F2
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF28DC7_2_00EF28DC
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF58D27_2_00EF58D2
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2CA57_2_00EF2CA5
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF28A37_2_00EF28A3
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF34BB7_2_00EF34BB
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF80887_2_00EF8088
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF34947_2_00EF3494
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2C7E7_2_00EF2C7E
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF345B7_2_00EF345B
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF28587_2_00EF2858
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF54557_2_00EF5455
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF30297_2_00EF3029
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2C3C7_2_00EF2C3C
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFBC317_2_00EFBC31
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF10007_2_00EF1000
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF34167_2_00EF3416
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2C157_2_00EF2C15
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF29ED7_2_00EF29ED
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF35E77_2_00EF35E7
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2DFE7_2_00EF2DFE
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF31DF7_2_00EF31DF
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFB1BF7_2_00EFB1BF
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2DB37_2_00EF2DB3
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2D897_2_00EF2D89
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF359C7_2_00EF359C
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF31947_2_00EF3194
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF29907_2_00EF2990
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF316D7_2_00EF316D
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF7D647_2_00EF7D64
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2D627_2_00EF2D62
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF35757_2_00EF3575
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFB1407_2_00EFB140
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF29577_2_00EF2957
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF312E7_2_00EF312E
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2D297_2_00EF2D29
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF353C7_2_00EF353C
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF29037_2_00EF2903
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2D027_2_00EF2D02
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF32EA7_2_00EF32EA
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2EE27_2_00EF2EE2
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2AFB7_2_00EF2AFB
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF56F87_2_00EF56F8
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF36DD7_2_00EF36DD
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2AD47_2_00EF2AD4
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF96A97_2_00EF96A9
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF328D7_2_00EF328D
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2A897_2_00EF2A89
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFAE867_2_00EFAE86
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF36807_2_00EF3680
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF32667_2_00EF3266
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFA6717_2_00EFA671
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2E4F7_2_00EF2E4F
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2A4A7_2_00EF2A4A
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2E257_2_00EF2E25
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF323F7_2_00EF323F
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF36357_2_00EF3635
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF360E7_2_00EF360E
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF32067_2_00EF3206
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2BEE7_2_00EF2BEE
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF73EC7_2_00EF73EC
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2FF07_2_00EF2FF0
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF33CB7_2_00EF33CB
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2FC37_2_00EF2FC3
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFABD57_2_00EFABD5
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF37BB7_2_00EF37BB
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF37987_2_00EF3798
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF83607_2_00EF8360
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2B497_2_00EF2B49
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF335C7_2_00EF335C
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF37557_2_00EF3755
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2F547_2_00EF2F54
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF9F517_2_00EF9F51
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF372E7_2_00EF372E
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2B227_2_00EF2B22
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF37077_2_00EF3707
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF2F1B7_2_00EF2F1B
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF33117_2_00EF3311
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF0B107_2_00EF0B10
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F004E87_2_00F004E8
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F03EB07_2_00F03EB0
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F01A0A7_2_00F01A0A
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F004D97_2_00F004D9
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F024BF7_2_00F024BF
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F006FA7_2_00F006FA
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F01A0A7_2_00F01A0A
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F01ED27_2_00F01ED2
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F006A67_2_00F006A6
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F006527_2_00F00652
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F007A27_2_00F007A2
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F033887_2_00F03388
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F03F687_2_00F03F68
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F0074E7_2_00F0074E
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F2E1587_2_00F2E158
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F2F5887_2_00F2F588
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F2EBF47_2_00F2EBF4
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F2F5787_2_00F2F578
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00F2EC667_2_00F2EC66
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_0109037A7_2_0109037A
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_010900707_2_01090070
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_010917887_2_01091788
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_010900117_2_01090011
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_01090D907_2_01090D90
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_010917617_2_01091761
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 8_2_007133608_2_00713360
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 8_2_00710A508_2_00710A50
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 8_2_007175408_2_00717540
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 8_2_007153F88_2_007153F8
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 8_2_007149D08_2_007149D0
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 8_2_007175308_2_00717530
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 8_2_00710A3F8_2_00710A3F
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_00233C7D13_2_00233C7D
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AC93013_2_015AC930
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A892013_2_015A8920
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AE1D813_2_015AE1D8
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A25B813_2_015A25B8
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015ABC4013_2_015ABC40
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A687813_2_015A6878
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AB8F013_2_015AB8F0
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A18E813_2_015A18E8
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A536C13_2_015A536C
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A27E813_2_015A27E8
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A9F8013_2_015A9F80
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AC27013_2_015AC270
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A3AF013_2_015A3AF0
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A02F013_2_015A02F0
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AA68013_2_015AA680
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A96B813_2_015A96B8
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A295713_2_015A2957
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AB14013_2_015AB140
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A357513_2_015A3575
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A316D13_2_015A316D
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2D6213_2_015A2D62
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A7D6413_2_015A7D64
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A891013_2_015A8910
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2D0213_2_015A2D02
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A290313_2_015A2903
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A353C13_2_015A353C
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2D2913_2_015A2D29
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A312E13_2_015A312E
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AC92013_2_015AC920
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A31DF13_2_015A31DF
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AE1C813_2_015AE1C8
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2DFE13_2_015A2DFE
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A29ED13_2_015A29ED
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A35E713_2_015A35E7
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A359C13_2_015A359C
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A299013_2_015A2990
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A319413_2_015A3194
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2D8913_2_015A2D89
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AB1BF13_2_015AB1BF
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2DB313_2_015A2DB3
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A345B13_2_015A345B
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A285813_2_015A2858
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A545513_2_015A5455
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2C7E13_2_015A2C7E
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AE81013_2_015AE810
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A341613_2_015A3416
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2C1513_2_015A2C15
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2C3C13_2_015A2C3C
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015ABC3113_2_015ABC31
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A283413_2_015A2834
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A302913_2_015A3029
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A442113_2_015A4421
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A28DC13_2_015A28DC
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A58D213_2_015A58D2
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A5CF013_2_015A5CF0
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A5CE013_2_015A5CE0
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AB8E013_2_015AB8E0
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A349413_2_015A3494
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A808813_2_015A8088
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A34BB13_2_015A34BB
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A28A313_2_015A28A3
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2CA513_2_015A2CA5
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A335C13_2_015A335C
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A9F5113_2_015A9F51
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A635613_2_015A6356
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2F5413_2_015A2F54
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A375513_2_015A3755
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2B4913_2_015A2B49
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A836013_2_015A8360
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2F1B13_2_015A2F1B
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A0B1013_2_015A0B10
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A331113_2_015A3311
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A370713_2_015A3707
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A372E13_2_015A372E
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2B2213_2_015A2B22
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AABD513_2_015AABD5
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A33CB13_2_015A33CB
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2FC313_2_015A2FC3
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2FF013_2_015A2FF0
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2BEE13_2_015A2BEE
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A73EC13_2_015A73EC
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A379813_2_015A3798
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A37BB13_2_015A37BB
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2A4A13_2_015A2A4A
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015ADA4813_2_015ADA48
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2E4F13_2_015A2E4F
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AA67113_2_015AA671
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A326613_2_015A3266
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A360E13_2_015A360E
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A320613_2_015A3206
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A323F13_2_015A323F
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A363513_2_015A3635
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2E2513_2_015A2E25
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A36DD13_2_015A36DD
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2AD413_2_015A2AD4
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2AFB13_2_015A2AFB
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A56F813_2_015A56F8
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A32EA13_2_015A32EA
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2EE213_2_015A2EE2
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A2A8913_2_015A2A89
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A328D13_2_015A328D
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A368013_2_015A3680
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015AAE8613_2_015AAE86
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015A96A913_2_015A96A9
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C04E813_2_015C04E8
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C1A0A13_2_015C1A0A
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C3EB013_2_015C3EB0
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C04D913_2_015C04D9
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C24BF13_2_015C24BF
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C074E13_2_015C074E
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C3F6813_2_015C3F68
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C338813_2_015C3388
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C07A213_2_015C07A2
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C065213_2_015C0652
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C1ED213_2_015C1ED2
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C1A0A13_2_015C1A0A
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C06FA13_2_015C06FA
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_015C06A613_2_015C06A6
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_0178037913_2_01780379
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_0178007013_2_01780070
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_0178123013_2_01781230
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_01780D6013_2_01780D60
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_01780D5013_2_01780D50
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_0178001213_2_01780012
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_0178124013_2_01781240
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_017AE15813_2_017AE158
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_017AF58813_2_017AF588
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_017AF57813_2_017AF578
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_017AEBF413_2_017AEBF4
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeCode function: 13_2_017AEC6613_2_017AEC66
Sample file is different than original file name gathered from version infoShow sources
Source: NEW_INVOICE.exe, 00000001.00000002.320768514.012BA000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameManHole.exe0 vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000001.00000002.320571277.01220000.00000008.00000001.sdmpBinary or memory string: originalfilename vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000001.00000002.320571277.01220000.00000008.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000001.00000002.321842021.03F40000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameCyaX.dll0 vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000001.00000002.318507957.007D0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoftware Updates.dllB vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000001.00000002.320873231.01F1B000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameetyhsYVkzJvsTBHqhWuvbBmDtVNgNDqwJlorOeh.exe4 vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000001.00000002.318657678.00890000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000001.00000002.317791403.00313000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000001.00000002.320481184.01150000.00000008.00000001.sdmpBinary or memory string: OriginalFilenameSETUPAPI.DLL.MUIj% vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000001.00000002.320508341.011A0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.594558286.012BA000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameManHole.exe0 vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.595383481.03EC0000.00000008.00000001.sdmpBinary or memory string: OriginalFilenamewinhttp.dll.muij% vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.594263316.01050000.00000008.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.594317226.010A0000.00000008.00000001.sdmpBinary or memory string: OriginalFilenameCRYPT32.DLL.MUIj% vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.592179329.002A3000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.592342373.002C9000.00000004.00000020.sdmpBinary or memory string: OriginalFilename#\?n vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.594342998.011B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.592774692.0044A000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameetyhsYVkzJvsTBHqhWuvbBmDtVNgNDqwJlorOeh.exe4 vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.594175188.00F10000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.595455160.04180000.00000008.00000001.sdmpBinary or memory string: OriginalFilenameKernelbasej% vs NEW_INVOICE.exe
Source: NEW_INVOICE.exe, 00000007.00000002.593072146.007E0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewbemdisp.tlbj% vs NEW_INVOICE.exe
Source: NEW_INVOICE.exeBinary or memory string: OriginalFilenameManHole.exe0 vs NEW_INVOICE.exe
Yara signature matchShow sources
Source: 00000001.00000002.321842021.03F40000.00000004.00000001.sdmp, type: MEMORYMatched rule: ConventionEngine_Term_Desktop sample_md5 = 71cdba3859ca8bd03c1e996a790c04f9, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 00000001.00000002.321842021.03F40000.00000004.00000001.sdmp, type: MEMORYMatched rule: ConventionEngine_Term_Users sample_md5 = 09e4e6fa85b802c46bc121fcaecc5666, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 00000008.00000002.474216706.03ED0000.00000004.00000001.sdmp, type: MEMORYMatched rule: ConventionEngine_Term_Desktop sample_md5 = 71cdba3859ca8bd03c1e996a790c04f9, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 00000008.00000002.474216706.03ED0000.00000004.00000001.sdmp, type: MEMORYMatched rule: ConventionEngine_Term_Users sample_md5 = 09e4e6fa85b802c46bc121fcaecc5666, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 8.2.SjKMY.exe.3ed0000.6.raw.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Desktop sample_md5 = 71cdba3859ca8bd03c1e996a790c04f9, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 8.2.SjKMY.exe.3ed0000.6.raw.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Users sample_md5 = 09e4e6fa85b802c46bc121fcaecc5666, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 8.2.SjKMY.exe.3ed0000.6.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Desktop sample_md5 = 71cdba3859ca8bd03c1e996a790c04f9, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 8.2.SjKMY.exe.3ed0000.6.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Users sample_md5 = 09e4e6fa85b802c46bc121fcaecc5666, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 1.2.NEW_INVOICE.exe.3f40000.6.raw.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Desktop sample_md5 = 71cdba3859ca8bd03c1e996a790c04f9, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 1.2.NEW_INVOICE.exe.3f40000.6.raw.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Users sample_md5 = 09e4e6fa85b802c46bc121fcaecc5666, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 1.2.NEW_INVOICE.exe.3f40000.6.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Desktop sample_md5 = 71cdba3859ca8bd03c1e996a790c04f9, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 1.2.NEW_INVOICE.exe.3f40000.6.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Users sample_md5 = 09e4e6fa85b802c46bc121fcaecc5666, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 8.2.SjKMY.exe.3e80000.5.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Desktop sample_md5 = 71cdba3859ca8bd03c1e996a790c04f9, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Source: 8.2.SjKMY.exe.3e80000.5.unpack, type: UNPACKEDPEMatched rule: ConventionEngine_Term_Users sample_md5 = 09e4e6fa85b802c46bc121fcaecc5666, author = @stvemillertime, description = Searching for PE files with PDB path keywords, terms or anomalies., ref_blog = https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
PE file has an executable .text section which is very likely to contain packed code (zlib compression ratio < 0.3)Show sources
Source: NEW_INVOICE.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: lNzSaUcIhlGHF.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: SjKMY.exe.7.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Classification labelShow sources
Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@14/10@2/1
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00ED02F6 AdjustTokenPrivileges,7_2_00ED02F6
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00ED02BF AdjustTokenPrivileges,7_2_00ED02BF
Creates files inside the user directoryShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile created: C:\Users\user\AppData\Roaming\lNzSaUcIhlGHF.exeJump to behavior
Creates mutexesShow sources
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Creates temporary filesShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB1D8.tmpJump to behavior
Found command line outputShow sources
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.{u..0.........,...X...Qv..........................`.....#.......%.....<...............P...........W.......G..uJump to behavior
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.{u..0.....E.R.R.O.R.:. .............................zu..............zu......,...w.@...G..u..................-.Jump to behavior
Source: C:\Windows\System32\schtasks.exeConsole Write: ........a.{u..0.............$.....................................$...................-.......6.t.......j...j..u..G.....Jump to behavior
PE file has an executable .text section and no other executable sectionShow sources
Source: NEW_INVOICE.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Parts of this applications are using the .NET runtime (Probably coded in C#)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Queries process information (via WMI, Win32_Process)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
Source: C:\Users\user\Desktop\NEW_INVOICE.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
Reads ini filesShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Reads software policiesShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Reads the hosts fileShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Sample is known by AntivirusShow sources
Source: NEW_INVOICE.exeVirustotal: Detection: 73%
Sample might require command line argumentsShow sources
Source: NEW_INVOICE.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will n
Source: NEW_INVOICE.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will n
Source: NEW_INVOICE.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will n
Source: NEW_INVOICE.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will n
Source: SjKMY.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will n
Source: SjKMY.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will n
Source: SjKMY.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will n
Source: SjKMY.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will n
Source: NEW_INVOICE.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will need to update this setting.
Source: NEW_INVOICE.exeString found in binary or memory: Get your Auth key from /etc/pihole/setupVars.conf on your Pi. You want the WEBPASSWORD hash displayed in that file. You will be unable to start/stop your Pi-Hole without this. This information is only stored locally, and if you change your password, you will need to update this setting.
Sample reads its own file contentShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile read: C:\Users\user\Desktop\NEW_INVOICE.exeJump to behavior
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\NEW_INVOICE.exe 'C:\Users\user\Desktop\NEW_INVOICE.exe'
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'powershell' Get-MpPreference -verbose
Source: unknownProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB1D8.tmp'
Source: unknownProcess created: C:\Users\user\Desktop\NEW_INVOICE.exe C:\Users\user\Desktop\NEW_INVOICE.exe
Source: unknownProcess created: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe 'C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe'
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'powershell' Get-MpPreference -verbose
Source: unknownProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB28F.tmp'
Source: unknownProcess created: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'powershell' Get-MpPreference -verboseJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB1D8.tmp'Jump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess created: C:\Users\user\Desktop\NEW_INVOICE.exe C:\Users\user\Desktop\NEW_INVOICE.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'powershell' Get-MpPreference -verboseJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB28F.tmp'Jump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess created: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeJump to behavior
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Uses Microsoft SilverlightShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
Checks if Microsoft Office is installedShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
PE file contains a COM descriptor data directoryShow sources
Source: NEW_INVOICE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Uses new MSVCR DllsShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\MSVCR80.dllJump to behavior
Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
Source: NEW_INVOICE.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Binary contains paths to debug symbolsShow sources
Source: Binary string: C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb source: NEW_INVOICE.exe, 00000001.00000002.321842021.03F40000.00000004.00000001.sdmp, SjKMY.exe, 00000008.00000002.472784341.0196B000.00000004.00000001.sdmp
Source: Binary string: mscorrc.pdb source: NEW_INVOICE.exe, 00000001.00000002.318657678.00890000.00000002.00000001.sdmp, NEW_INVOICE.exe, 00000007.00000002.594342998.011B0000.00000002.00000001.sdmp, SjKMY.exe, 00000008.00000002.474032664.03E20000.00000002.00000001.sdmp, SjKMY.exe, 0000000D.00000002.601889277.03B80000.00000002.00000001.sdmp

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_0123793A push cs; retn 000Eh1_2_012379BC
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_01237F0D push cs; ret 1_2_01237FC4
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_01237877 push cs; retn 000Eh1_2_012379BC
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_01235BBC push cs; ret 1_2_01235BC8
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_012358F0 push cs; ret 1_2_01235B48
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_012379FB push cs; ret 1_2_01237A84
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_01237FC5 push cs; ret 1_2_01238084
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_012379C4 push cs; ret 1_2_01237A84
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_01235CC9 push cs; ret 1_2_01235D48
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_00287839 push eax; retn 0028h1_2_002878A5
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_00287839 push eax; retn 0028h1_2_002878C1
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_002880A5 push esp; ret 1_2_002880DD
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_002878E9 pushad ; retn 0028h1_2_00287901
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_002878C8 pushad ; retn 0028h1_2_002878E5
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_002878C8 pushad ; retn 0028h1_2_00287901
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_0123793A push cs; retn 000Eh7_2_012379BC
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_01237F0D push cs; ret 7_2_01237FC4
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_01237877 push cs; retn 000Eh7_2_012379BC
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_01235BBC push cs; ret 7_2_01235BC8
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_012358F0 push cs; ret 7_2_01235B48
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_012379FB push cs; ret 7_2_01237A84
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_01237FC5 push cs; ret 7_2_01238084
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_012379C4 push cs; ret 7_2_01237A84
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_01235CC9 push cs; ret 7_2_01235D48
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_0038907D pushad ; retn 0038h7_2_0038908D
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_003890E0 push esp; retn 0038h7_2_003890FD
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_0038915C push esp; retn 0038h7_2_00389169
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00389692 push ecx; ret 7_2_00389695
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00384FA1 push 50390002h; iretd 7_2_00384FA9
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EF7191 push esi; ret 7_2_00EF71A7
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 7_2_00EFD24F push es; retf 7_2_00EFD260
Binary may include packed or encrypted codeShow sources
Source: initial sampleStatic PE information: section name: .text entropy: 7.40004234633
Source: initial sampleStatic PE information: section name: .text entropy: 7.40004234633
Source: initial sampleStatic PE information: section name: .text entropy: 7.40004234633
.NET source code contains many randomly named methodsShow sources
Source: NEW_INVOICE.exe, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: NEW_INVOICE.exe, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'
Source: lNzSaUcIhlGHF.exe.1.dr, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: lNzSaUcIhlGHF.exe.1.dr, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'
Source: 1.0.NEW_INVOICE.exe.1230000.0.unpack, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: 1.0.NEW_INVOICE.exe.1230000.0.unpack, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'
Source: 1.2.NEW_INVOICE.exe.1230000.5.unpack, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: 1.2.NEW_INVOICE.exe.1230000.5.unpack, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'
Source: SjKMY.exe.7.dr, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: SjKMY.exe.7.dr, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'
Source: 7.0.NEW_INVOICE.exe.1230000.0.unpack, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: 7.0.NEW_INVOICE.exe.1230000.0.unpack, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'
Source: 7.2.NEW_INVOICE.exe.1230000.6.unpack, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: 7.2.NEW_INVOICE.exe.1230000.6.unpack, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'
Source: 8.2.SjKMY.exe.270000.0.unpack, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: 8.2.SjKMY.exe.270000.0.unpack, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'
Source: 8.0.SjKMY.exe.270000.0.unpack, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: 8.0.SjKMY.exe.270000.0.unpack, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'
Source: 13.2.SjKMY.exe.270000.0.unpack, ManHole/gRDP.csHigh entropy of concatenated method names: '.ctor', 'ceccTWDomyAWGsbYfaKNUOUfueBaYuYSrywN', 'GekvLxQJPFLCrLTiSxihEEWEzmBnPpbZAH', 'SpELbVgRRdJsmFrzcwimhBsdJIKQIfOkg', 'yJpCyqDZZjbNHbWolbRrFuDBheHtFCjEnVzV', 'LvjwzTcIDfqajkgHtgmBrsUepIuVqXmKr', 'TgXuEOoAyaewYFcImbavxLUHfJAnbIKDiuSr', 'wEZPhmvhcOAUyLABPdvkgLmelgJCTyiXYss', 'gJFoocbSbqcdGJUUwWOhirJkqOmPhQGwZU', 'JuewCwwyBnyzCXtaNconXFvCsxlozmAVdD'
Source: 13.2.SjKMY.exe.270000.0.unpack, ManHole/cyvBzJ.csHigh entropy of concatenated method names: '.ctor', 'NeNPrejckhVXOJSsvlxqNXXNZBBXzWjrHV', 'PyGRJqLdImArgEHriNGtrxeHNLtAIiEdALjL', 'ujoZtSfZJdGfitbOxEbgrBTVXoRmCblxsCV', 'HJXNkiiNDrJRRPLKiceHiAsNCoDVlLxwa', 'RqHeYaNpuGtYCeozpYLOGzvewlRhXZoLk', 'XloCXDOxKtkWsEWVDSlNpgaEDqfUPgsUs', 'wlioHZoYoToZnwAELAjBEJChvnGXkXbdabTk', 'ueJjyxQcfzzoEzcxpJspcKSjydffuCOwczvJ', 'yYlBnrelsxXghmsKufgkAlDpVTQaBrLXHOsn'

Persistence and Installation Behavior:

barindex
Drops PE filesShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile created: C:\Users\user\AppData\Roaming\lNzSaUcIhlGHF.exeJump to dropped file
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile created: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeJump to dropped file

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
Source: unknownProcess created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB1D8.tmp'
Creates an autostart registry keyShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run MNltZVnoJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run MNltZVnoJump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile opened: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe:Zone.Identifier read attributes | deleteJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeFile opened: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe:Zone.Identifier read attributes | deleteJump to behavior
Monitors certain registry keys / values for changes (often done to protect autostart functionality)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Yara detected AntiVM_3Show sources
Source: Yara matchFile source: Process Memory Space: SjKMY.exe PID: 3300, type: MEMORY
Source: Yara matchFile source: Process Memory Space: NEW_INVOICE.exe PID: 3540, type: MEMORY
Yara detected Cassandra CrypterShow sources
Source: Yara matchFile source: 00000008.00000002.472784341.0196B000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.321842021.03F40000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000001.00000002.320873231.01F1B000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 00000008.00000002.474216706.03ED0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: SjKMY.exe PID: 3300, type: MEMORY
Source: Yara matchFile source: Process Memory Space: NEW_INVOICE.exe PID: 3540, type: MEMORY
Source: Yara matchFile source: 8.2.SjKMY.exe.3ed0000.6.raw.unpack, type: UNPACKEDPE
Source: Yara matchFile source: 1.2.NEW_INVOICE.exe.3f40000.6.raw.unpack, type: UNPACKEDPE
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_BaseBoard
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_VideoController
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_VideoController
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
Source: NEW_INVOICE.exe, 00000001.00000002.320855805.01F0F000.00000004.00000001.sdmp, SjKMY.exe, 00000008.00000002.472767399.0195F000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
Source: NEW_INVOICE.exe, 00000001.00000002.320855805.01F0F000.00000004.00000001.sdmp, SjKMY.exe, 00000008.00000002.472767399.0195F000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
Contains capabilities to detect virtual machinesShow sources
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: IdentifierJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\Disk\Enum name: 0Jump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000 name: DriverDescJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
Contains long sleeps (>= 3 min)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeThread delayed: delay time: 1200000Jump to behavior
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exe TID: 3740Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exe TID: 3516Thread sleep time: -50397s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exe TID: 3680Thread sleep time: -300000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exe TID: 3680Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exe TID: 3616Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3876Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exe TID: 4000Thread sleep time: -540000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exe TID: 3964Thread sleep time: -32000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exe TID: 2932Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exe TID: 4080Thread sleep time: -32000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 4060Thread sleep time: -420000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 4048Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 3268Thread sleep time: -46960s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 4060Thread sleep time: -60000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 2236Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2080Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 2856Thread sleep time: -540000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 2288Thread sleep count: 33 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 2288Thread sleep time: -33000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 2652Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe TID: 2652Thread sleep time: -1200000s >= -30000sJump to behavior
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
Source: C:\Users\user\Desktop\NEW_INVOICE.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeWMI Queries: IWbemServices::CreateInstanceEnum - Win32_Processor
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM Win32_Processor
Sample execution stops while process was sleeping (likely an evasion)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeLast function: Thread delayed
Enumerates the file systemShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory)Show sources
Source: SjKMY.exe, 00000008.00000002.472767399.0195F000.00000004.00000001.sdmpBinary or memory string: vmware
Source: SjKMY.exe, 00000008.00000002.472767399.0195F000.00000004.00000001.sdmpBinary or memory string: VMWARE
Source: SjKMY.exe, 00000008.00000002.472767399.0195F000.00000004.00000001.sdmpBinary or memory string: l&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: SjKMY.exe, 00000008.00000002.472767399.0195F000.00000004.00000001.sdmpBinary or memory string: l#"SOFTWARE\VMware, Inc.\VMware Tools
Source: SjKMY.exe, 00000008.00000002.472767399.0195F000.00000004.00000001.sdmpBinary or memory string: lA"SOFTWARE\VMware, Inc.\VMware Tools
Source: SjKMY.exe, 00000008.00000002.472767399.0195F000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
Source: NEW_INVOICE.exe, 00000001.00000002.320971840.02EC0000.00000004.00000001.sdmp, NEW_INVOICE.exe, 00000007.00000002.592714992.00402000.00000040.00000001.sdmp, SjKMY.exe, 00000008.00000002.472861212.02910000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599326080.00402000.00000040.00000001.sdmpBinary or memory string: m_ThreadStaticValueget_GetInstancehpgohckwckjckzckrckucklckbckmckecknckpctvctyctxctsctqctwctjctzctrctuctlctbctmctectnctpcvycvxcvscvqcvwcvjcvzcvrMutexSystem.ThreadingcvucvlcvbcvmcvecvncvpcyxcyscyqcywcyjcyzgokGetLastInputInfouser32.dllgotgovgoygoxgoqgasgawgajgdfgdqSystem.DrawingImageCodecInfoSystem.Drawing.ImagingImageFormatgdwgdugdlgdbgdmgdegfhgfsElapsedEventArgsSystem.TimersgfqgfwghlghbghmgheghpgktgkvgkwgkugklgkmgkegkngkpgtygtxgtsgtwgtjgtzgvxgvsgvqgvrgwpMemoryStreamgjzgjrgjugjlgzpDeleteFilekernel32grugrlgrbgrmgregulGetModuleFileNameAgubgumguegunMoveFileExWgupglbglmglegbegbngbpgmngmpcodcofcohget_CHset_CHWithEventsValuecomcoeget_kbHookset_kbHookcadGetForegroundWindowcafStringBuilderSystem.TextGetWindowTextcahcakcatcavGetWindowTextLengthcaycaxGetKeyboardStatecascaqMapVirtualKeycawcajcazEnumProcessModulespsapi.dllcarcaucalcabcamGetModuleFileNameExcaecancapcdfcdhGetWindowThreadProcessIdcdkcdtcdvGetKeyboardLayoutuser32cdycdxToUnicodeExcdscdqcdwcdjcdzcdrcducdlcdbcfscfucfechkchxchzSystem.Windows.FormsKeyschrchbchmcyrcyukqcbSizedwTimekwEnumvalue__OperatingSystemNameProcessorNameAmountOfMemorykjxexnPasswordget_PasswordHashget_Passwordset_PasswordValuekzkrtytxtstmtetnvrvuyqywyjypxsxqxpsqswzmzeThreadExeNamesjszqljrjuzpNativeWindowuplbruSetClipboardViewerrlrbChangeClipboardChainrmrernSendMessagerpulubumadd_Changedobjremove_ChangedueunWndProcMessageFinalizelmznMulticastDelegateTargetObjectTargetMethodBeginInvokeIAsyncResultAsyncCallbacksenderDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultInvokebngcegcnWH_KEYBOARD_LLHC_ACTIONWM_KEYDOWNWM_KEYUPWM_SYSKEYDOWNWM_SYSKEYUPgcpgoabpSetWindowsHookExUser32.dllmemnmpenepCallNextHookExnpgcogcagcdgcfUnhookWindowsHookExgchadd_KeyDownremove_KeyDownadd_KeyUpremove_KeyUpgckgctgcvgcygcugodgoflevkCodescanCodeflagstimedwExtraInfolnLLKHF_EXTENDEDLLKHF_INJECTEDLLKHF_ALTDOWNLLKHF_UPlpKeybmbenCodewParamlParamcylcwncwpcjzcjrcjucybcyecxbcxecsmcsecsncspcqlcqbcwzcwrcjlcjbcjnczecrpMD5System.Security.Cryptographyculcubclmcleclnclpcbmget_UserNameset_UserNameget_URLset_URLget_Browserset_Browsercbecbncbpcmecmn
Source: SjKMY.exe, 00000008.00000002.472767399.0195F000.00000004.00000001.sdmpBinary or memory string: l87HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\VMware Tools\.
Queries a list of all running processesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging:

barindex
Enables debug privilegesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess token adjusted: DebugJump to behavior
Creates guard pages, often used to prevent reverse engineering and debuggingShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeMemory written: C:\Users\user\Desktop\NEW_INVOICE.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeMemory written: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe base: 400000 value starts with: 4D5AJump to behavior
Modifies the context of a thread in another process (thread injection)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeThread register set: target process: 3968Jump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeThread register set: target process: 2900Jump to behavior
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'powershell' Get-MpPreference -verboseJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'powershell' Get-MpPreference -verboseJump to behavior
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: NEW_INVOICE.exe, 00000007.00000002.594575102.012C0000.00000002.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599729471.00860000.00000002.00000001.sdmpBinary or memory string: Progman
Source: NEW_INVOICE.exe, 00000007.00000002.594575102.012C0000.00000002.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599729471.00860000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: NEW_INVOICE.exe, 00000007.00000002.594575102.012C0000.00000002.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599729471.00860000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeQueries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
Contains functionality to query the account / user nameShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_007C2C06 GetUserNameA,1_2_007C2C06
Queries the cryptographic machine GUIDShow sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Lowering of HIPS / PFW / Operating System Security Settings:

barindex
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM AntivirusProduct
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeWMI Queries: IWbemServices::ExecQuery - SELECT * FROM AntivirusProduct

Stealing of Sensitive Information:

barindex
Yara detected AgentTeslaShow sources
Source: Yara matchFile source: 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000D.00000002.600936606.01B80000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: SjKMY.exe PID: 2900, type: MEMORY
Source: Yara matchFile source: Process Memory Space: NEW_INVOICE.exe PID: 3968, type: MEMORY
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
Tries to harvest and steal browser information (history, passwords, etc)Show sources
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
Tries to harvest and steal ftp login credentialsShow sources
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
Tries to steal Mail credentials (via file access)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
Source: C:\Users\user\Desktop\NEW_INVOICE.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
Source: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
Yara detected Credential StealerShow sources
Source: Yara matchFile source: 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000D.00000002.600936606.01B80000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: SjKMY.exe PID: 2900, type: MEMORY
Source: Yara matchFile source: Process Memory Space: NEW_INVOICE.exe PID: 3968, type: MEMORY

Remote Access Functionality:

barindex
Yara detected AgentTeslaShow sources
Source: Yara matchFile source: 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: 0000000D.00000002.600936606.01B80000.00000004.00000001.sdmp, type: MEMORY
Source: Yara matchFile source: Process Memory Space: SjKMY.exe PID: 2900, type: MEMORY
Source: Yara matchFile source: Process Memory Space: NEW_INVOICE.exe PID: 3968, type: MEMORY
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)Show sources
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_007C0DBA bind,1_2_007C0DBA
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_007C09AA listen,1_2_007C09AA
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_007C096C listen,1_2_007C096C
Source: C:\Users\user\Desktop\NEW_INVOICE.exeCode function: 1_2_007C0D87 bind,1_2_007C0D87

Malware Configuration

Threatname: Agenttesla

{"To: ": "rameshwar.raut@eminentleague.com", "ByHost:": "mail.eminentleague.com:587", "From: ": "rameshwar.raut@eminentleague.com"}

Signature Similarity

Sample Distance (10 = nearest)
10 9 8 7 6 5 4 3 2 1
Samplename Analysis ID SHA256 Similarity

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1048170 Sample: NEW_INVOICE.exe Startdate: 24/01/2020 Architecture: WINDOWS Score: 100 43 Found malware configuration 2->43 45 Antivirus detection for dropped file 2->45 47 Antivirus detection for sample 2->47 49 10 other signatures 2->49 6 NEW_INVOICE.exe 6 2->6         started        10 SjKMY.exe 4 2->10         started        process3 file4 27 C:\Users\user\AppData\...\lNzSaUcIhlGHF.exe, PE32 6->27 dropped 29 C:\...\lNzSaUcIhlGHF.exe:Zone.Identifier, ASCII 6->29 dropped 31 C:\Users\user\AppData\Local\...\tmpB1D8.tmp, XML 6->31 dropped 51 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 6->51 53 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->53 55 Modifies the context of a thread in another process (thread injection) 6->55 12 NEW_INVOICE.exe 1 9 6->12         started        17 powershell.exe 6 6->17         started        19 schtasks.exe 6->19         started        57 Antivirus detection for dropped file 10->57 59 Machine Learning detection for dropped file 10->59 61 Injects a PE file into a foreign processes 10->61 21 SjKMY.exe 4 10->21         started        23 powershell.exe 7 10->23         started        25 schtasks.exe 10->25         started        signatures5 process6 dnsIp7 37 eminentleague.com 192.185.129.21, 49164, 49167, 49168 unknown United States 12->37 39 mail.eminentleague.com 12->39 33 C:\Users\user\AppData\Roaming\...\SjKMY.exe, PE32 12->33 dropped 35 C:\Users\user\...\SjKMY.exe:Zone.Identifier, ASCII 12->35 dropped 63 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->63 65 Tries to steal Mail credentials (via file access) 12->65 67 Hides that the sample has been downloaded from the Internet (zone.identifier) 12->67 69 Installs a global keyboard hook 12->69 41 mail.eminentleague.com 21->41 71 Tries to harvest and steal ftp login credentials 21->71 73 Tries to harvest and steal browser information (history, passwords, etc) 21->73 file8 signatures9

Simulations

Behavior and APIs

TimeTypeDescription
13:25:54API Interceptor966x Sleep call for process: NEW_INVOICE.exe modified
13:25:56API Interceptor24x Sleep call for process: powershell.exe modified
13:25:58API Interceptor2x Sleep call for process: schtasks.exe modified
13:26:50AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run MNltZVno C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe
13:26:59API Interceptor480x Sleep call for process: SjKMY.exe modified

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
NEW_INVOICE.exe73%VirustotalBrowse
NEW_INVOICE.exe100%AviraTR/Dropper.MSIL.ugaix
NEW_INVOICE.exe100%Joe Sandbox ML

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe100%AviraTR/Dropper.MSIL.ugaix
C:\Users\user\AppData\Roaming\lNzSaUcIhlGHF.exe100%AviraTR/Dropper.MSIL.ugaix
C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\lNzSaUcIhlGHF.exe100%Joe Sandbox ML

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
13.2.SjKMY.exe.270000.0.unpack100%AviraTR/Dropper.MSIL.ugaixDownload File
7.0.NEW_INVOICE.exe.1230000.0.unpack100%AviraTR/Dropper.MSIL.ugaixDownload File
8.0.SjKMY.exe.270000.0.unpack100%AviraTR/Dropper.MSIL.ugaixDownload File
13.0.SjKMY.exe.270000.0.unpack100%AviraTR/Dropper.MSIL.ugaixDownload File
13.2.SjKMY.exe.400000.2.unpack100%AviraTR/Dropper.GenDownload File
1.0.NEW_INVOICE.exe.1230000.0.unpack100%AviraTR/Dropper.MSIL.ugaixDownload File
7.2.NEW_INVOICE.exe.1230000.6.unpack100%AviraTR/Dropper.MSIL.ugaixDownload File
7.2.NEW_INVOICE.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File

Domains

SourceDetectionScannerLabelLink
eminentleague.com0%VirustotalBrowse
mail.eminentleague.com0%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
http://cps.letsencrypt.org00%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://pi.hole/admin/5ManHole0%Avira URL Cloudsafe
http://crl.useZ0%Avira URL Cloudsafe
http://ocsp.int-x3.letsencrypt.org0/0%URL Reputationsafe
https://v6745Ki5eOlpwSJ6UFt.org0%Avira URL Cloudsafe
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
https://v6745Ki5eOlpwSJ6UFt.orgH0%Avira URL Cloudsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://ocsp.int-x3.letsencrypt.orT0%Avira URL Cloudsafe
http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
http://www.usertrust.0%URL Reputationsafe
http://pi.hole/admin/0%Avira URL Cloudsafe

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000008.00000002.472784341.0196B000.00000004.00000001.sdmpJoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security
    00000001.00000002.321842021.03F40000.00000004.00000001.sdmpConventionEngine_Term_DesktopSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
    • 0x1a6b:$anchor: Desktop
    • 0x24eb:$anchor: Desktop
    • 0x24c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
    00000001.00000002.321842021.03F40000.00000004.00000001.sdmpConventionEngine_Term_UsersSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
    • 0x24db:$anchor: Users
    • 0x24c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
    00000001.00000002.321842021.03F40000.00000004.00000001.sdmpJoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security
      00000001.00000002.320873231.01F1B000.00000004.00000001.sdmpJoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security
        00000008.00000002.474216706.03ED0000.00000004.00000001.sdmpConventionEngine_Term_DesktopSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
        • 0x1a6b:$anchor: Desktop
        • 0x24eb:$anchor: Desktop
        • 0x24c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
        00000008.00000002.474216706.03ED0000.00000004.00000001.sdmpConventionEngine_Term_UsersSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
        • 0x24db:$anchor: Users
        • 0x24c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
        00000008.00000002.474216706.03ED0000.00000004.00000001.sdmpJoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security
          00000007.00000002.594629850.01EC0000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000007.00000002.594629850.01EC0000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0000000D.00000002.600936606.01B80000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0000000D.00000002.600936606.01B80000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Process Memory Space: SjKMY.exe PID: 2900JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Process Memory Space: SjKMY.exe PID: 2900JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                      Process Memory Space: SjKMY.exe PID: 3300JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                        Process Memory Space: SjKMY.exe PID: 3300JoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security
                          Process Memory Space: NEW_INVOICE.exe PID: 3968JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                            Process Memory Space: NEW_INVOICE.exe PID: 3968JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                              Process Memory Space: NEW_INVOICE.exe PID: 3540JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                                Process Memory Space: NEW_INVOICE.exe PID: 3540JoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security

                                  Unpacked PEs

                                  SourceRuleDescriptionAuthorStrings
                                  8.2.SjKMY.exe.3ed0000.6.raw.unpackConventionEngine_Term_DesktopSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                  • 0x1a6b:$anchor: Desktop
                                  • 0x24eb:$anchor: Desktop
                                  • 0x24c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
                                  8.2.SjKMY.exe.3ed0000.6.raw.unpackConventionEngine_Term_UsersSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                  • 0x24db:$anchor: Users
                                  • 0x24c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
                                  8.2.SjKMY.exe.3ed0000.6.raw.unpackJoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security
                                    8.2.SjKMY.exe.3ed0000.6.unpackConventionEngine_Term_DesktopSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                    • 0x6eb:$anchor: Desktop
                                    • 0x6c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
                                    8.2.SjKMY.exe.3ed0000.6.unpackConventionEngine_Term_UsersSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                    • 0x6db:$anchor: Users
                                    • 0x6c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
                                    1.2.NEW_INVOICE.exe.3f40000.6.raw.unpackConventionEngine_Term_DesktopSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                    • 0x1a6b:$anchor: Desktop
                                    • 0x24eb:$anchor: Desktop
                                    • 0x24c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
                                    1.2.NEW_INVOICE.exe.3f40000.6.raw.unpackConventionEngine_Term_UsersSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                    • 0x24db:$anchor: Users
                                    • 0x24c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
                                    1.2.NEW_INVOICE.exe.3f40000.6.raw.unpackJoeSecurity_CassandraCrypterYara detected Cassandra CrypterJoe Security
                                      1.2.NEW_INVOICE.exe.3f40000.6.unpackConventionEngine_Term_DesktopSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                      • 0x6eb:$anchor: Desktop
                                      • 0x6c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
                                      1.2.NEW_INVOICE.exe.3f40000.6.unpackConventionEngine_Term_UsersSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                      • 0x6db:$anchor: Users
                                      • 0x6c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
                                      8.2.SjKMY.exe.3e80000.5.unpackConventionEngine_Term_DesktopSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                      • 0x4f6eb:$anchor: Desktop
                                      • 0x4f6c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb
                                      8.2.SjKMY.exe.3e80000.5.unpackConventionEngine_Term_UsersSearching for PE files with PDB path keywords, terms or anomalies.@stvemillertime
                                      • 0x4f6db:$anchor: Users
                                      • 0x4f6c0:$pcre: RSDS\x03\x0B\xECI\xE5\xC6?L\x8B\xC6`mF\x8FP\xF6\x01C:\Users\Cassandra\Desktop\Premium\CyaX\CyaX\obj\Debug\CyaX.pdb

                                      Sigma Overview


                                      System Summary:

                                      barindex
                                      Sigma detected: Scheduled temp file as task from temp locationShow sources
                                      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB1D8.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB1D8.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\NEW_INVOICE.exe' , ParentImage: C:\Users\user\Desktop\NEW_INVOICE.exe, ParentProcessId: 3540, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB1D8.tmp', ProcessId: 3900

                                      Joe Sandbox View / Context

                                      IPs

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      192.185.129.21http://m-d.co.in/Rechnung/012019Get hashmaliciousBrowse
                                      • m-d.co.in/favicon.ico

                                      Domains

                                      No context

                                      ASN

                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      unknownNota Spese.xlsGet hashmaliciousBrowse
                                      • 45.84.0.8
                                      http://axdsz.pro/?target=-7EBNQCgQAAAPQGwPVLQAFAQEREQoRCQoRDUIRDRIAAX9hZGNvbWJvATE#al=26230#ap=26041Get hashmaliciousBrowse
                                      • 91.228.154.124
                                      http://ggmail.comGet hashmaliciousBrowse
                                      • 173.194.79.154
                                      http://www.direct2print.co.ukGet hashmaliciousBrowse
                                      • 52.4.32.92
                                      -#U2709-Colt-Employee-Benefits-Pol#U03b9cy-45766405.htmlGet hashmaliciousBrowse
                                      • 23.111.164.58
                                      rech_190822556.htmlGet hashmaliciousBrowse
                                      • 45.67.229.95
                                      rech_190822556.htmlGet hashmaliciousBrowse
                                      • 13.224.96.124
                                      HOL415687447.htmlGet hashmaliciousBrowse
                                      • 13.224.96.126
                                      HOL415687447.htmlGet hashmaliciousBrowse
                                      • 13.224.96.93
                                      https://thespoteventvenue.net/TP/Severin.bayer/c2V2ZXJpbi5iYXllckBjb2x0Lm5ldA==Get hashmaliciousBrowse
                                      • 144.208.74.176
                                      FileZilla_3.46.3_win32_sponsored-setup.exeGet hashmaliciousBrowse
                                      • 5.62.44.66
                                      23-11-18 (Copier).htmlGet hashmaliciousBrowse
                                      • 88.99.66.31
                                      http://yesimsatirli.com/baby/Documentation/Get hashmaliciousBrowse
                                      • 5.2.78.43
                                      https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmerrilledge.tt.omtrdc.net%2Fm2%2Fmerrilledge%2Fubox%2Fimage%3Fmbox%3DoptOut%26profile.throttle_value%3D999%26mboxDefault%3Dhttps%3A%2F%2Fis.gd%2FuoSKRo&data=02%7C01%7CProfiling%40idcare.org%7Cff5c767b73dc41878c3708d7a06b2bb0%7Cf9d906e6c5d54033a34720a87f8a13eb%7C1%7C0%7C637154255133518251&sdata=uSLGRNIStKp0P7ykV5jAFp1nFhyWRiF42Plwv2Ry6rI%3D&reserved=0Get hashmaliciousBrowse
                                      • 104.25.23.21
                                      view_presentation_e0j.vbsGet hashmaliciousBrowse
                                      • 47.56.155.167
                                      PicturethrillSetup.exeGet hashmaliciousBrowse
                                      • 104.18.137.190
                                      http://astrotechsteels.com/iodasiduasdasd/mt2Get hashmaliciousBrowse
                                      • 142.44.174.197
                                      pimTNyOSw.exeGet hashmaliciousBrowse
                                      • 127.0.0.1
                                      https://linkprotect.cudasvc.com/url?a=https%3a%2f%2f260NS9VZ95SSN9XV2Z9WN22S9529VNNW95N.turismosurdelosrios.cl%2f%3femail%3dcjones%40murexltd.com&c=E,1,p3mKvJyJgF7qWMvjT45AM_To_CcYCG3BCU7zMJsCOQJ2vnof7lw_77bHhEr8-ge1Twu-jgFJv0vwJZmcp0kt0uX7UdrLX-qTZubZW7rwR21WzAq4wtFrqA,,&typo=1Get hashmaliciousBrowse
                                      • 104.17.64.4
                                      ATT01483.htmGet hashmaliciousBrowse
                                      • 13.35.253.5

                                      JA3 Fingerprints

                                      No context

                                      Dropped Files

                                      No context

                                      Screenshots

                                      Thumbnails

                                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                                      windows-stand

                                      Startup

                                      • System is w7_1
                                      • NEW_INVOICE.exe (PID: 3540 cmdline: 'C:\Users\user\Desktop\NEW_INVOICE.exe' MD5: A24C195DA4F8A5DEE365875B3E3A38A1)
                                        • powershell.exe (PID: 3656 cmdline: 'powershell' Get-MpPreference -verbose MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
                                        • schtasks.exe (PID: 3900 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB1D8.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
                                        • NEW_INVOICE.exe (PID: 3968 cmdline: C:\Users\user\Desktop\NEW_INVOICE.exe MD5: A24C195DA4F8A5DEE365875B3E3A38A1)
                                      • SjKMY.exe (PID: 3300 cmdline: 'C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe' MD5: A24C195DA4F8A5DEE365875B3E3A38A1)
                                        • powershell.exe (PID: 3840 cmdline: 'powershell' Get-MpPreference -verbose MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
                                        • schtasks.exe (PID: 3780 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB28F.tmp' MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
                                        • SjKMY.exe (PID: 2900 cmdline: C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe MD5: A24C195DA4F8A5DEE365875B3E3A38A1)
                                      • cleanup

                                      Created / dropped Files

                                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                      Process:C:\Users\user\Desktop\NEW_INVOICE.exe
                                      File Type:data
                                      Size (bytes):893
                                      Entropy (8bit):7.366016576663508
                                      Encrypted:false
                                      MD5:D4AE187B4574036C2D76B6DF8A8C1A30
                                      SHA1:B06F409FA14BAB33CBAF4A37811B8740B624D9E5
                                      SHA-256:A2CE3A0FA7D2A833D1801E01EC48E35B70D84F3467CC9F8FAB370386E13879C7
                                      SHA-512:1F44A360E8BB8ADA22BC5BFE001F1BABB4E72005A46BC2A94C33C4BD149FF256CCE6F35D65CA4F7FC2A5B9E15494155449830D2809C8CF218D0B9196EC646B0C
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview: 0..y..*.H.........j0..f...1.0...*.H.........N0..J0..2.......D....'..09...@k0...*.H........0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30...000930211219Z..210930140115Z0?1$0"..U....Digital Signature Trust Co.1.0...U....DST Root CA X30.."0...*.H.............0..........P..W..be......,k0.[...}.@......3vI*.?!I..N..>H.e...!.e.*.2....w..{........s.z..2..~..0....*8.y.1.P..e.Qc...a.Ka..Rk...K.(.H......>.... .[.*....p....%.tr.{j.4.0...h.{T....Z...=d.....Ap..r.&.8U9C....\@........%.......:..n.>..\..<.i....*.)W..=....]......B0@0...U.......0....0...U...........0...U.........{,q...K.u...`...0...*.H...............,...\...(f7:...?K.... ]..YD.>.>..K.t.....t..~.....K. D....}..j.....N..:.pI...........:^H...X._..Z.....Y..n......f3.Y[...sG.+..7H..VK....r2...D.SrmC.&H.Rg.X..gvqx...V..9$1....Z0G..P.......dc`........}...=2.e..|.Wv..(9..e...w.j..w.......)...55.1.
                                      C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
                                      Process:C:\Users\user\Desktop\NEW_INVOICE.exe
                                      File Type:data
                                      Size (bytes):252
                                      Entropy (8bit):3.011479071771695
                                      Encrypted:false
                                      MD5:858C7C3342AE518033351A189D63B486
                                      SHA1:8F168BA1DA45B686003013343D3FAF7D395BD7E6
                                      SHA-256:14CC949F0BFC305D54594A90FCCE8FB2A5649C1C376726A9EE5260CDBE323718
                                      SHA-512:FF3A59C8059F195A7896007B1AAD0F56659A707770CF384DE01110410FE8FE60F8B16C17353B7B9F681DCFB768D5FE4592A7A04CF41EDB6FD0ECDAEAD152AF91
                                      Malicious:false
                                      Reputation:low
                                      Preview: p...... ....`....5.....(....................................................... ........_[.z....Q..(...........}...h.t.t.p.:././.a.p.p.s...i.d.e.n.t.r.u.s.t...c.o.m./.r.o.o.t.s./.d.s.t.r.o.o.t.c.a.x.3...p.7.c...".3.7.d.-.5.9.c.a.9.2.e.e.9.4.9.8.0."...
                                      C:\Users\user\AppData\Local\Temp\tmpB1D8.tmp
                                      Process:C:\Users\user\Desktop\NEW_INVOICE.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Size (bytes):1645
                                      Entropy (8bit):5.1289587740971045
                                      Encrypted:false
                                      MD5:46C510CC07F2D7EBB4373E9ED9B10F65
                                      SHA1:C13487473E96DAE11E461AF878662528FD9B122B
                                      SHA-256:7B785577B84F1110A93DEA44CA9896358D759B503A4E5DF47FB7FAF74B1073A3
                                      SHA-512:F1E35358F6E9012CB92E8F6D1064E8E8981B78DF580F2DFC27B2899173A9AD20D37DCD3213AF9C163ADFBC30F045F19493C78A2D52A41BC7BACB00662D0A7E05
                                      Malicious:true
                                      Reputation:low
                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</Star
                                      C:\Users\user\AppData\Local\Temp\tmpB28F.tmp
                                      Process:C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Size (bytes):1645
                                      Entropy (8bit):5.1289587740971045
                                      Encrypted:false
                                      MD5:46C510CC07F2D7EBB4373E9ED9B10F65
                                      SHA1:C13487473E96DAE11E461AF878662528FD9B122B
                                      SHA-256:7B785577B84F1110A93DEA44CA9896358D759B503A4E5DF47FB7FAF74B1073A3
                                      SHA-512:F1E35358F6E9012CB92E8F6D1064E8E8981B78DF580F2DFC27B2899173A9AD20D37DCD3213AF9C163ADFBC30F045F19493C78A2D52A41BC7BACB00662D0A7E05
                                      Malicious:false
                                      Reputation:low
                                      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true</Star
                                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AZX544L1NOFYBDML4BDJ.temp
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Size (bytes):8016
                                      Entropy (8bit):3.5704919026824595
                                      Encrypted:false
                                      MD5:8C91DCC2899350DC511D8FA604CBF627
                                      SHA1:0AE0891304F434123D3B10F8D28C4D09D722DE15
                                      SHA-256:D6A23CC197966912010FC16259F6F8D669A9A4BED77C09E2FAD93EFF2A1E20EA
                                      SHA-512:C09397D7D1A0B28DA7FC1159DCCEAE451E810790731031A9852E573748B433F009BD2F49F5B83FEC148CE43A45038E4AE2F7610CF2DC0D9207BCEF9F86914CFC
                                      Malicious:false
                                      Reputation:low
                                      Preview: ...................................FL..................F.".. ....b..>...#...>...#...>...k............................P.O. .:i.....+00.../C:\...................\.1.....lF.R. PROGRA~2..D.......:..lF.R*.........................P.r.o.g.r.a.m.D.a.t.a.....X.1......H]:. MICROS~1..@.......:...H]:*.........................M.i.c.r.o.s.o.f.t.....R.1.....M>O@. Windows.<.......:..M>O@*...(.....................W.i.n.d.o.w.s.......1.....~F\O..STARTM~1..j.......:..~F\O*...2...............@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......I.k..Programs..f.......:...I.k*...3...............<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1......I.h..ACCESS~1..l.......:..M>Z@*...4...............B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:.%..WINDOW~1..R.......:.&.:.%*...8.....................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:.& .WINDOW~1.LNK..Z.......:.&.:.&*....)....................W.i.n.d.o.w.s.
                                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\HD5C8X6YVH9IY3KNPMG3.temp
                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Size (bytes):8016
                                      Entropy (8bit):3.5704919026824595
                                      Encrypted:false
                                      MD5:8C91DCC2899350DC511D8FA604CBF627
                                      SHA1:0AE0891304F434123D3B10F8D28C4D09D722DE15
                                      SHA-256:D6A23CC197966912010FC16259F6F8D669A9A4BED77C09E2FAD93EFF2A1E20EA
                                      SHA-512:C09397D7D1A0B28DA7FC1159DCCEAE451E810790731031A9852E573748B433F009BD2F49F5B83FEC148CE43A45038E4AE2F7610CF2DC0D9207BCEF9F86914CFC
                                      Malicious:false
                                      Reputation:low
                                      Preview: ...................................FL..................F.".. ....b..>...#...>...#...>...k............................P.O. .:i.....+00.../C:\...................\.1.....lF.R. PROGRA~2..D.......:..lF.R*.........................P.r.o.g.r.a.m.D.a.t.a.....X.1......H]:. MICROS~1..@.......:...H]:*.........................M.i.c.r.o.s.o.f.t.....R.1.....M>O@. Windows.<.......:..M>O@*...(.....................W.i.n.d.o.w.s.......1.....~F\O..STARTM~1..j.......:..~F\O*...2...............@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1......I.k..Programs..f.......:...I.k*...3...............<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1......I.h..ACCESS~1..l.......:..M>Z@*...4...............B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:.%..WINDOW~1..R.......:.&.:.%*...8.....................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:.& .WINDOW~1.LNK..Z.......:.&.:.&*....)....................W.i.n.d.o.w.s.
                                      C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe
                                      Process:C:\Users\user\Desktop\NEW_INVOICE.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Size (bytes):556032
                                      Entropy (8bit):7.385329869892082
                                      Encrypted:false
                                      MD5:A24C195DA4F8A5DEE365875B3E3A38A1
                                      SHA1:89894D4B3132F35AC36132DDDD587C23CE866EEC
                                      SHA-256:606B235A75668449B6CA23C5588DB0CBD43AB384AE0553A55732E58A73882122
                                      SHA-512:258435D569A9C589BF54996717A03B4A50360E6C896CEED03B313157D68485575F34C60FE2845569D98DBB6A7B1AF1F6934C7CD15D4A331FB73BB6756A8A24B4
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      Reputation:low
                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...[p%^.................p............... ........@.. ....................................@.................................<...O.................................................................................... ............... ..H............text....n... ...p.................. ..`.rsrc................r..............@..@.reloc...............z..............@..B................p.......H.......H?...N...........C..x............................................0............(....(..........(.....o.....*.....................(.......(.......(.......(.......(.....*.N..(....o....(.....*&..(.....*...s.........s.........s.........s.........s.........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.................,.........o....+....9....~.........,2~.........(....o .....,.
                                      C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe:Zone.Identifier
                                      Process:C:\Users\user\Desktop\NEW_INVOICE.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview: [ZoneTransfer]....ZoneId=0
                                      C:\Users\user\AppData\Roaming\lNzSaUcIhlGHF.exe
                                      Process:C:\Users\user\Desktop\NEW_INVOICE.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Size (bytes):556032
                                      Entropy (8bit):7.385329869892082
                                      Encrypted:false
                                      MD5:A24C195DA4F8A5DEE365875B3E3A38A1
                                      SHA1:89894D4B3132F35AC36132DDDD587C23CE866EEC
                                      SHA-256:606B235A75668449B6CA23C5588DB0CBD43AB384AE0553A55732E58A73882122
                                      SHA-512:258435D569A9C589BF54996717A03B4A50360E6C896CEED03B313157D68485575F34C60FE2845569D98DBB6A7B1AF1F6934C7CD15D4A331FB73BB6756A8A24B4
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      Reputation:low
                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...[p%^.................p............... ........@.. ....................................@.................................<...O.................................................................................... ............... ..H............text....n... ...p.................. ..`.rsrc................r..............@..@.reloc...............z..............@..B................p.......H.......H?...N...........C..x............................................0............(....(..........(.....o.....*.....................(.......(.......(.......(.......(.....*.N..(....o....(.....*&..(.....*...s.........s.........s.........s.........s.........*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0...........~....o.....+..*.0.................,.........o....+....9....~.........,2~.........(....o .....,.
                                      C:\Users\user\AppData\Roaming\lNzSaUcIhlGHF.exe:Zone.Identifier
                                      Process:C:\Users\user\Desktop\NEW_INVOICE.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview: [ZoneTransfer]....ZoneId=0

                                      Domains and IPs

                                      Contacted Domains

                                      NameIPActiveMaliciousAntivirus DetectionReputation
                                      eminentleague.com
                                      192.185.129.21
                                      truetrueunknown
                                      mail.eminentleague.com
                                      unknown
                                      unknowntrueunknown

                                      URLs from Memory and Binaries

                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                      • 0%, Virustotal, Browse
                                      • URL Reputation: safe
                                      unknown
                                      http://crl.entrust.net/server1.crl0NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                        high
                                        http://cps.letsencrypt.org0NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://ocsp.entrust.net03NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://pi.hole/admin/5ManHoleNEW_INVOICE.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://cert.int-x3.letsencrypt.org/0NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                          high
                                          https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=3J2L3Z4DHW9UYSjKMY.exe, NEW_INVOICE.exefalse
                                            high
                                            http://crl.useZSjKMY.exe, 0000000D.00000002.602446126.04CD0000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://ocsp.int-x3.letsencrypt.org0/NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            https://v6745Ki5eOlpwSJ6UFt.orgSjKMY.exe, 0000000D.00000002.600936606.01B80000.00000004.00000001.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.diginotar.nl/cps/pkioverheid0NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                            • URL Reputation: safe
                                            low
                                            https://paypal.me/justinboughtonSjKMY.exe, SjKMY.exe, 0000000D.00000000.468616532.00272000.00000020.00020000.sdmp, NEW_INVOICE.exefalse
                                              high
                                              https://v6745Ki5eOlpwSJ6UFt.orgHSjKMY.exe, 0000000D.00000002.600936606.01B80000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://ocsp.entrust.net0DNEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://secure.comodo.com/CPS0NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                                high
                                                http://crl.entrust.net/2048ca.crl0NEW_INVOICE.exe, 00000007.00000002.592489886.00346000.00000004.00000020.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                                  high
                                                  http://ocsp.int-x3.letsencrypt.orTSjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://cps.root-x1.letsencrypt.org0NEW_INVOICE.exe, 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, SjKMY.exe, 0000000D.00000002.599660337.00642000.00000004.00000020.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://www.usertrust.SjKMY.exe, 0000000D.00000002.602446126.04CD0000.00000004.00000001.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://pi.hole/admin/NEW_INVOICE.exefalse
                                                  • Avira URL Cloud: safe
                                                  unknown

                                                  Contacted IPs

                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs

                                                  Public

                                                  IPCountryFlagASNASN NameMalicious
                                                  192.185.129.21
                                                  United States
                                                  46606unknowntrue

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):7.385329869892082
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                  • Win32 Executable (generic) a (10002005/4) 49.75%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Windows Screen Saver (13104/52) 0.07%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  File name:NEW_INVOICE.exe
                                                  File size:556032
                                                  MD5:a24c195da4f8a5dee365875b3e3a38a1
                                                  SHA1:89894d4b3132f35ac36132dddd587c23ce866eec
                                                  SHA256:606b235a75668449b6ca23c5588db0cbd43ab384ae0553a55732e58a73882122
                                                  SHA512:258435d569a9c589bf54996717a03b4a50360e6c896ceed03b313157d68485575f34c60fe2845569d98dbb6a7b1af1f6934c7cd15d4a331fb73bb6756a8a24b4
                                                  SSDEEP:12288:LxpQJFjY1HkXPLQky7EI5vnAi3h/Vx+KjarA7:1+7jYdKPy1vAEx+TrA7
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...[p%^.................p............... ........@.. ....................................@................................

                                                  File Icon

                                                  Icon Hash:aab2e3e39383aa00

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x488e8e
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                  Time Stamp:0x5E25705B [Mon Jan 20 09:18:19 2020 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v2.0.50727
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Entrypoint Preview

                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x88e3c0x4f.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x8a0000x800.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x8c0000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x86e940x87000False0.803370949074data7.40004234633IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x8a0000x8000x800False0.3486328125data3.54747235368IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0x8c0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_VERSION0x8a0900x3c4data
                                                  RT_MANIFEST0x8a4640x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                  Imports

                                                  DLLImport
                                                  mscoree.dll_CorExeMain

                                                  Version Infos

                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyrightCopyright 2018 Justin Boughton
                                                  Assembly Version1.2.2.0
                                                  InternalNameManHole.exe
                                                  FileVersion1.2.2.0
                                                  CompanyNameJustin Boughton
                                                  LegalTrademarks
                                                  CommentsA simple stat viewer and management utility for Pi-Hole software
                                                  ProductNameManHole
                                                  ProductVersion1.2.2.0
                                                  FileDescriptionManHole
                                                  OriginalFilenameManHole.exe

                                                  Network Behavior

                                                  Network Port Distribution

                                                  TCP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 24, 2020 13:27:11.138900042 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:11.269542933 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:11.269965887 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:11.635843992 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:11.636332989 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:11.767146111 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:11.768887997 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:11.903709888 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:11.991286993 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:12.138353109 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:12.138377905 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:12.138391018 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:12.138567924 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:12.179358959 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:12.310749054 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:12.525557995 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:26.354283094 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:26.485173941 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:26.511954069 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:26.642870903 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:26.650279045 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:26.803409100 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:26.805442095 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:26.936297894 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:26.937362909 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:27.072266102 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:27.074508905 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:27.205180883 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:27.210073948 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:27.210441113 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:27.210702896 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:27.210963964 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:27:27.340681076 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:27.340933084 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:27.341213942 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:27.341470003 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:27.345470905 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:27:27.556304932 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:16.454399109 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:16.583884954 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:16.584194899 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:16.934586048 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:16.945132017 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:17.075393915 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:17.076788902 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:17.210445881 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:17.421000004 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:17.566405058 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:17.566436052 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:17.566453934 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:17.566831112 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:17.597399950 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:17.728471041 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:17.931926012 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:18.550838947 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:18.681126118 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:18.681874990 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:18.811589003 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:18.812172890 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:18.983716011 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:18.983752012 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:18.984379053 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.114547014 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.115441084 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.247786999 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.248573065 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.378288984 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.379086018 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.379340887 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.379429102 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.379513979 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.446685076 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.447540998 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.495266914 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.508481979 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.509345055 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.509551048 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.509572983 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.512631893 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.512856007 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.576195955 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.576436043 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.577347040 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.577450037 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.578814030 CET58749164192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.578902960 CET49164587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.624970913 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.625740051 CET58749167192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.625986099 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.626036882 CET49167587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.629403114 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.757006884 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.757364035 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:19.977699995 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:19.978310108 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.107522964 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.107825994 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.160048008 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.160263062 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.240483046 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.241574049 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.288248062 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.288605928 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.386985064 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.387023926 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.387043953 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.387159109 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.418502092 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.420600891 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.421639919 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.548599958 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.562397957 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.566796064 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.566814899 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.566827059 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.566896915 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.590795040 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.691373110 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.691878080 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.719279051 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.724821091 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.820879936 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.822424889 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.852739096 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.853290081 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.975508928 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.975876093 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:20.981540918 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:20.981884003 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.104597092 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.104969025 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.147423029 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.147917032 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.236017942 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.236603022 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.275760889 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.276182890 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.365422010 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.366272926 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.366760969 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.366945982 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.367058992 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.367202044 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.406474113 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.406894922 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.494987965 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.495145082 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.495364904 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.495517015 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.495634079 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.495714903 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.495738983 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.495820999 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.534636974 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.535571098 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.535778046 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.535891056 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.536051035 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.536230087 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.623816967 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.623934984 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.624142885 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.624294043 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.624305964 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.624351978 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.624419928 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.624473095 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.624614000 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.624713898 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.663228989 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.663300037 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.663397074 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.663400888 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.663532019 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.663535118 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.663773060 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.663922071 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.752628088 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.752760887 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.752808094 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.752913952 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.752948046 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.752978086 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.753124952 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.753217936 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.753849983 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.754139900 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.754400015 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.754657984 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.754924059 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.755187988 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.755434036 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.755728006 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.791109085 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.791135073 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.791244984 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.791465044 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.791594028 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.791683912 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.881473064 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.882110119 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.882414103 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.882677078 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.882921934 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.883179903 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.883455992 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.883687019 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.883929968 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.884396076 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.884423018 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.884444952 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.884864092 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.885191917 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.885457039 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.885859013 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.886166096 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.886504889 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.918924093 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.918953896 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.919105053 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.919148922 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.919172049 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.919197083 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:21.919574976 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.919697046 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.919815063 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.919922113 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.920027971 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.920135975 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.920269966 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:21.920377016 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.010745049 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.011183977 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.012480021 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.012861967 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.013015032 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.013200045 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.013375044 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.013565063 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.013712883 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.013931990 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.014370918 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.014385939 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.014559984 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.014673948 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.014734030 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.014966011 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.015044928 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.015247107 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.046938896 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.047118902 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.047219038 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.047312975 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.047441006 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.047528982 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.047625065 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.047693968 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.047852039 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.047899008 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.048228979 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.048319101 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.048511028 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.048703909 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.048947096 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.049279928 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.049617052 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.049921036 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.139827967 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.140255928 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.141426086 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.141660929 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.141746998 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.141916037 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.142118931 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.142416954 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.142455101 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.142632008 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.143307924 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.143348932 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.143476963 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.143618107 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.143739939 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.143874884 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.144062996 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.144249916 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.175667048 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.175708055 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.175820112 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.176048994 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.176059961 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.176212072 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.176246881 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.176346064 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.176460981 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.176585913 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.176743031 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.176877975 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.176959038 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.177090883 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.177136898 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.177360058 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.177464962 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.177911997 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.268922091 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.269365072 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.270359993 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.270406008 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.270607948 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.270756960 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.271166086 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.271187067 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.271362066 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.271640062 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.272198915 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.272367954 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.272466898 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.272528887 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.272578955 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.272752047 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.272804976 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.272954941 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.303865910 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.303939104 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.303957939 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.304234982 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.304255962 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.304357052 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.304553032 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.304645061 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.304672956 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.304682970 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.304814100 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.304934025 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.304995060 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.305105925 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.305301905 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.305429935 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.305474043 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.305680037 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.397986889 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.398670912 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.399169922 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.399329901 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.399636030 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.399779081 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.400384903 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.400417089 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.400696039 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.400804043 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.400968075 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.401371956 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.401396036 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.401469946 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.401663065 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.401825905 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.401937962 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.402054071 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.432080984 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.432401896 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.432626009 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.432682037 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.432691097 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.432699919 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.432719946 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.432835102 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.433052063 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.433213949 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.433445930 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.433581114 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.433590889 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.433613062 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.433721066 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.434015036 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.434313059 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.434564114 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.527477026 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.528135061 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.528156042 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.528283119 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.528647900 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.529006004 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.529267073 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.529428959 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.529711962 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.530090094 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.530241013 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.530396938 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.530468941 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.530625105 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.530657053 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.530814886 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.531018019 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.531126976 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.560221910 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.560575962 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.560697079 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.560807943 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.560895920 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.561034918 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.561108112 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.561130047 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.561254978 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.561343908 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.561451912 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.561561108 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.561584949 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.561903000 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.561908960 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.562200069 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.562273979 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.562552929 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.660248995 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.660279036 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.660293102 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.660305977 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.660319090 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.660331964 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.660345078 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.660357952 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.660370111 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.661565065 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.661729097 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.661923885 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.688271046 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.688496113 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.688611031 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.688847065 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.688970089 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.689095020 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.689394951 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.689748049 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.690357924 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.692580938 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.692676067 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.692750931 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.692847013 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.692964077 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.693056107 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.693142891 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.693213940 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.693306923 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.792907000 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.796802044 CET58749168192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.820271969 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.820296049 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.820311069 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.820564985 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.820581913 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.820597887 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.820633888 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.820727110 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.821352005 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.821619987 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.821959972 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.822096109 CET49169587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:22.949485064 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.949523926 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.949594975 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.951751947 CET58749169192.185.129.21192.168.1.16
                                                  Jan 24, 2020 13:28:22.993714094 CET49168587192.168.1.16192.185.129.21
                                                  Jan 24, 2020 13:28:23.150352001 CET49169587192.168.1.16192.185.129.21

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 24, 2020 13:27:10.926304102 CET5626553192.168.1.168.8.8.8
                                                  Jan 24, 2020 13:27:11.095786095 CET53562658.8.8.8192.168.1.16
                                                  Jan 24, 2020 13:27:13.404232979 CET6025953192.168.1.168.8.8.8
                                                  Jan 24, 2020 13:27:13.427861929 CET53602598.8.8.8192.168.1.16
                                                  Jan 24, 2020 13:27:13.441203117 CET5935553192.168.1.168.8.8.8
                                                  Jan 24, 2020 13:27:13.472940922 CET53593558.8.8.8192.168.1.16
                                                  Jan 24, 2020 13:27:14.220590115 CET5703453192.168.1.168.8.8.8
                                                  Jan 24, 2020 13:27:14.244148970 CET53570348.8.8.8192.168.1.16
                                                  Jan 24, 2020 13:27:15.213515043 CET5703453192.168.1.168.8.8.8
                                                  Jan 24, 2020 13:27:15.237108946 CET53570348.8.8.8192.168.1.16
                                                  Jan 24, 2020 13:27:16.213596106 CET5703453192.168.1.168.8.8.8
                                                  Jan 24, 2020 13:27:16.237109900 CET53570348.8.8.8192.168.1.16
                                                  Jan 24, 2020 13:27:18.217652082 CET5703453192.168.1.168.8.8.8
                                                  Jan 24, 2020 13:27:18.244271994 CET53570348.8.8.8192.168.1.16
                                                  Jan 24, 2020 13:27:22.229660988 CET5703453192.168.1.168.8.8.8
                                                  Jan 24, 2020 13:27:22.253144026 CET53570348.8.8.8192.168.1.16
                                                  Jan 24, 2020 13:28:16.229892015 CET6306853192.168.1.168.8.8.8
                                                  Jan 24, 2020 13:28:16.404453039 CET53630688.8.8.8192.168.1.16

                                                  DNS Queries

                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                  Jan 24, 2020 13:27:10.926304102 CET192.168.1.168.8.8.80x3a51Standard query (0)mail.eminentleague.comA (IP address)IN (0x0001)
                                                  Jan 24, 2020 13:28:16.229892015 CET192.168.1.168.8.8.80x6cbcStandard query (0)mail.eminentleague.comA (IP address)IN (0x0001)

                                                  DNS Answers

                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                  Jan 24, 2020 13:27:11.095786095 CET8.8.8.8192.168.1.160x3a51No error (0)mail.eminentleague.comeminentleague.comCNAME (Canonical name)IN (0x0001)
                                                  Jan 24, 2020 13:27:11.095786095 CET8.8.8.8192.168.1.160x3a51No error (0)eminentleague.com192.185.129.21A (IP address)IN (0x0001)
                                                  Jan 24, 2020 13:28:16.404453039 CET8.8.8.8192.168.1.160x6cbcNo error (0)mail.eminentleague.comeminentleague.comCNAME (Canonical name)IN (0x0001)
                                                  Jan 24, 2020 13:28:16.404453039 CET8.8.8.8192.168.1.160x6cbcNo error (0)eminentleague.com192.185.129.21A (IP address)IN (0x0001)

                                                  SMTP Packets

                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                  Jan 24, 2020 13:27:11.635843992 CET58749164192.185.129.21192.168.1.16220-cp-ht-3.webhostbox.net ESMTP Exim 4.92 #2 Fri, 24 Jan 2020 12:26:44 +0000
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Jan 24, 2020 13:27:11.636332989 CET49164587192.168.1.16192.185.129.21EHLO 899552
                                                  Jan 24, 2020 13:27:11.767146111 CET58749164192.185.129.21192.168.1.16250-cp-ht-3.webhostbox.net Hello 899552 [84.17.52.66]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Jan 24, 2020 13:27:11.768887997 CET49164587192.168.1.16192.185.129.21STARTTLS
                                                  Jan 24, 2020 13:27:11.903709888 CET58749164192.185.129.21192.168.1.16220 TLS go ahead
                                                  Jan 24, 2020 13:28:16.934586048 CET58749167192.185.129.21192.168.1.16220-cp-ht-3.webhostbox.net ESMTP Exim 4.92 #2 Fri, 24 Jan 2020 12:27:49 +0000
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Jan 24, 2020 13:28:16.945132017 CET49167587192.168.1.16192.185.129.21EHLO 899552
                                                  Jan 24, 2020 13:28:17.075393915 CET58749167192.185.129.21192.168.1.16250-cp-ht-3.webhostbox.net Hello 899552 [84.17.52.66]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Jan 24, 2020 13:28:17.076788902 CET49167587192.168.1.16192.185.129.21STARTTLS
                                                  Jan 24, 2020 13:28:17.210445881 CET58749167192.185.129.21192.168.1.16220 TLS go ahead
                                                  Jan 24, 2020 13:28:19.577347040 CET58749164192.185.129.21192.168.1.16421 cp-ht-3.webhostbox.net lost input connection
                                                  Jan 24, 2020 13:28:19.624970913 CET58749167192.185.129.21192.168.1.16421 cp-ht-3.webhostbox.net lost input connection
                                                  Jan 24, 2020 13:28:19.977699995 CET58749168192.185.129.21192.168.1.16220-cp-ht-3.webhostbox.net ESMTP Exim 4.92 #2 Fri, 24 Jan 2020 12:27:52 +0000
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Jan 24, 2020 13:28:19.978310108 CET49168587192.168.1.16192.185.129.21EHLO 899552
                                                  Jan 24, 2020 13:28:20.107522964 CET58749168192.185.129.21192.168.1.16250-cp-ht-3.webhostbox.net Hello 899552 [84.17.52.66]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Jan 24, 2020 13:28:20.107825994 CET49168587192.168.1.16192.185.129.21STARTTLS
                                                  Jan 24, 2020 13:28:20.160048008 CET58749169192.185.129.21192.168.1.16220-cp-ht-3.webhostbox.net ESMTP Exim 4.92 #2 Fri, 24 Jan 2020 12:27:52 +0000
                                                  220-We do not authorize the use of this system to transport unsolicited,
                                                  220 and/or bulk e-mail.
                                                  Jan 24, 2020 13:28:20.160263062 CET49169587192.168.1.16192.185.129.21EHLO 899552
                                                  Jan 24, 2020 13:28:20.240483046 CET58749168192.185.129.21192.168.1.16220 TLS go ahead
                                                  Jan 24, 2020 13:28:20.288248062 CET58749169192.185.129.21192.168.1.16250-cp-ht-3.webhostbox.net Hello 899552 [84.17.52.66]
                                                  250-SIZE 52428800
                                                  250-8BITMIME
                                                  250-PIPELINING
                                                  250-AUTH PLAIN LOGIN
                                                  250-STARTTLS
                                                  250 HELP
                                                  Jan 24, 2020 13:28:20.288605928 CET49169587192.168.1.16192.185.129.21STARTTLS
                                                  Jan 24, 2020 13:28:20.420600891 CET58749169192.185.129.21192.168.1.16220 TLS go ahead

                                                  Code Manipulations

                                                  Statistics

                                                  CPU Usage

                                                  Click to jump to process

                                                  Memory Usage

                                                  Click to jump to process

                                                  High Level Behavior Distribution

                                                  Click to dive into process behavior distribution

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:13:25:53
                                                  Start date:20/01/2020
                                                  Path:C:\Users\user\Desktop\NEW_INVOICE.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:'C:\Users\user\Desktop\NEW_INVOICE.exe'
                                                  Imagebase:0x1230000
                                                  File size:556032 bytes
                                                  MD5 hash:A24C195DA4F8A5DEE365875B3E3A38A1
                                                  Has administrator privileges:false
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: ConventionEngine_Term_Desktop, Description: Searching for PE files with PDB path keywords, terms or anomalies., Source: 00000001.00000002.321842021.03F40000.00000004.00000001.sdmp, Author: @stvemillertime
                                                  • Rule: ConventionEngine_Term_Users, Description: Searching for PE files with PDB path keywords, terms or anomalies., Source: 00000001.00000002.321842021.03F40000.00000004.00000001.sdmp, Author: @stvemillertime
                                                  • Rule: JoeSecurity_CassandraCrypter, Description: Yara detected Cassandra Crypter, Source: 00000001.00000002.321842021.03F40000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CassandraCrypter, Description: Yara detected Cassandra Crypter, Source: 00000001.00000002.320873231.01F1B000.00000004.00000001.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  General

                                                  Start time:13:25:55
                                                  Start date:20/01/2020
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:'powershell' Get-MpPreference -verbose
                                                  Imagebase:0x21ad0000
                                                  File size:452608 bytes
                                                  MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
                                                  Has administrator privileges:false
                                                  Programmed in:.Net C# or VB.NET
                                                  Reputation:high

                                                  General

                                                  Start time:13:25:58
                                                  Start date:20/01/2020
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB1D8.tmp'
                                                  Imagebase:0xe10000
                                                  File size:179712 bytes
                                                  MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate

                                                  General

                                                  Start time:13:25:59
                                                  Start date:20/01/2020
                                                  Path:C:\Users\user\Desktop\NEW_INVOICE.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Users\user\Desktop\NEW_INVOICE.exe
                                                  Imagebase:0x1230000
                                                  File size:556032 bytes
                                                  MD5 hash:A24C195DA4F8A5DEE365875B3E3A38A1
                                                  Has administrator privileges:false
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.594629850.01EC0000.00000004.00000001.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  General

                                                  Start time:13:26:58
                                                  Start date:20/01/2020
                                                  Path:C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:'C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe'
                                                  Imagebase:0x270000
                                                  File size:556032 bytes
                                                  MD5 hash:A24C195DA4F8A5DEE365875B3E3A38A1
                                                  Has administrator privileges:false
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CassandraCrypter, Description: Yara detected Cassandra Crypter, Source: 00000008.00000002.472784341.0196B000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: ConventionEngine_Term_Desktop, Description: Searching for PE files with PDB path keywords, terms or anomalies., Source: 00000008.00000002.474216706.03ED0000.00000004.00000001.sdmp, Author: @stvemillertime
                                                  • Rule: ConventionEngine_Term_Users, Description: Searching for PE files with PDB path keywords, terms or anomalies., Source: 00000008.00000002.474216706.03ED0000.00000004.00000001.sdmp, Author: @stvemillertime
                                                  • Rule: JoeSecurity_CassandraCrypter, Description: Yara detected Cassandra Crypter, Source: 00000008.00000002.474216706.03ED0000.00000004.00000001.sdmp, Author: Joe Security
                                                  Antivirus matches:
                                                  • Detection: 100%, Avira
                                                  • Detection: 100%, Joe Sandbox ML
                                                  Reputation:low

                                                  General

                                                  Start time:13:27:00
                                                  Start date:20/01/2020
                                                  Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:'powershell' Get-MpPreference -verbose
                                                  Imagebase:0x21c00000
                                                  File size:452608 bytes
                                                  MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
                                                  Has administrator privileges:false
                                                  Programmed in:.Net C# or VB.NET
                                                  Reputation:high

                                                  General

                                                  Start time:13:27:03
                                                  Start date:20/01/2020
                                                  Path:C:\Windows\System32\schtasks.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\lNzSaUcIhlGHF' /XML 'C:\Users\user\AppData\Local\Temp\tmpB28F.tmp'
                                                  Imagebase:0x980000
                                                  File size:179712 bytes
                                                  MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate

                                                  General

                                                  Start time:13:27:04
                                                  Start date:20/01/2020
                                                  Path:C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Users\user\AppData\Roaming\dDFKPCD\SjKMY.exe
                                                  Imagebase:0x270000
                                                  File size:556032 bytes
                                                  MD5 hash:A24C195DA4F8A5DEE365875B3E3A38A1
                                                  Has administrator privileges:false
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.600936606.01B80000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000D.00000002.600936606.01B80000.00000004.00000001.sdmp, Author: Joe Security
                                                  Reputation:low

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:14.7%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:4%
                                                    Total number of Nodes:149
                                                    Total number of Limit Nodes:7

                                                    Graph

                                                    execution_graph 7415 26b426 7417 26b45e LsaLookupSids 7415->7417 7418 26b4c2 7417->7418 7419 7c15fa 7421 7c1620 AddAtomW 7419->7421 7422 7c163c 7421->7422 7484 7c133a 7485 7c138a CreateFileMappingW 7484->7485 7486 7c1392 7485->7486 7487 7c0dba 7489 7c0def bind 7487->7489 7490 7c0e23 7489->7490 7423 26a8ae 7424 26a910 7423->7424 7425 26a8da closesocket 7423->7425 7424->7425 7426 26a8e8 7425->7426 7427 7c3176 7430 7c319f SetFileAttributesW 7427->7430 7429 7c31bb 7430->7429 7431 7c34f6 7434 7c351c DeleteFileW 7431->7434 7433 7c3538 7434->7433 7435 26bc2a 7437 26bc62 CreateFileW 7435->7437 7438 26bcb1 7437->7438 7491 26bb6a 7493 26bb96 GetFileAttributesExW 7491->7493 7494 26bbb2 7493->7494 7439 7c0b72 7441 7c0ba7 GetProcessTimes 7439->7441 7442 7c0bd9 7441->7442 7443 7c00f2 7444 7c0142 GetComputerNameW 7443->7444 7445 7c0150 7444->7445 7446 7c296e 7447 7c29a6 DuplicateHandle 7446->7447 7449 7c29f3 7447->7449 7495 7c27aa 7497 7c27df RegSetValueExW 7495->7497 7498 7c2823 7497->7498 7499 7c09aa 7500 7c09df listen 7499->7500 7502 7c0a08 7500->7502 7503 7c0426 7504 7c045e OpenFileMappingW 7503->7504 7506 7c0499 7504->7506 7507 7c0526 7509 7c055e MapViewOfFile 7507->7509 7510 7c05ad 7509->7510 7511 7c16a6 7514 7c16d2 LoadLibraryShim 7511->7514 7513 7c1700 7514->7513 7515 26a2fa 7516 26a326 CloseHandle 7515->7516 7517 26a365 7515->7517 7518 26a334 7516->7518 7517->7516 7453 7c1162 7455 7c1197 WSAEventSelect 7453->7455 7456 7c11ce 7455->7456 7457 7c13e2 7458 7c141a MapViewOfFile 7457->7458 7459 7c1452 7457->7459 7460 7c1428 7458->7460 7459->7458 7519 7c08a2 7520 7c08da CreateMutexW 7519->7520 7522 7c091d 7520->7522 7461 7c105e 7462 7c1096 accept 7461->7462 7464 7c10d1 7462->7464 7523 7c2f9e 7524 7c2fc4 SetNamedSecurityInfoW 7523->7524 7526 7c3012 7524->7526 7527 7c0e9e 7530 7c0ed3 getsockname 7527->7530 7529 7c0f07 7530->7529 7465 26b002 7467 26b037 GetTokenInformation 7465->7467 7468 26b074 7467->7468 7531 26bd42 7533 26bd77 GetFileType 7531->7533 7534 26bda4 7533->7534 7535 7c331a 7537 7c3340 ShellExecuteExW 7535->7537 7538 7c335c 7537->7538 7539 7c211a 7541 7c2155 LoadLibraryA 7539->7541 7542 7c2192 7541->7542 7543 7c389a 7544 7c38cf PostMessageW 7543->7544 7545 7c38fa 7543->7545 7546 7c38e4 7544->7546 7545->7544 7547 26b84e 7549 26b886 WSASocketW 7547->7549 7550 26b8c2 7549->7550 7469 26ba0a 7470 26ba74 7469->7470 7471 26ba3c GetLongPathNameW 7469->7471 7470->7471 7472 26ba4a 7471->7472 7551 784d08 7552 784d17 7551->7552 7553 784e6a 7552->7553 7555 786a84 7552->7555 7556 786aa2 7555->7556 7563 7c2c06 7556->7563 7567 7c2bd2 7556->7567 7557 786b6b 7557->7553 7558 786b3e 7558->7557 7571 7c2ccb 7558->7571 7575 7c2d02 7558->7575 7565 7c2c3e GetUserNameA 7563->7565 7566 7c2c75 7565->7566 7566->7558 7569 7c2c06 GetUserNameA 7567->7569 7570 7c2c75 7569->7570 7570->7558 7573 7c2cd3 FindWindowA 7571->7573 7574 7c2d76 7573->7574 7574->7557 7577 7c2d3d FindWindowA 7575->7577 7578 7c2d76 7577->7578 7578->7557 7579 26ab56 7580 26ab8e RegOpenKeyExW 7579->7580 7582 26abe4 7580->7582 7583 26a5d6 7584 26a614 DuplicateHandle 7583->7584 7585 26a64c 7583->7585 7586 26a622 7584->7586 7585->7584 7587 7c308e 7589 7c30b7 CopyFileW 7587->7589 7590 7c30de 7589->7590 7591 26b952 7592 26b9c2 7591->7592 7593 26b98a setsockopt 7591->7593 7592->7593 7594 26b998 7593->7594 7595 26bed2 7596 26bf07 ReadFile 7595->7596 7598 26bf39 7596->7598 7477 26b31e 7478 26b356 LsaOpenPolicy 7477->7478 7480 26b397 7478->7480 7603 26ac5e 7604 26ac93 RegQueryValueExW 7603->7604 7606 26ace7 7604->7606 7481 7c28c6 7482 7c2916 CreatePipe 7481->7482 7483 7c291e 7482->7483 7607 7c2682 7608 7c26ba RegCreateKeyExW 7607->7608 7610 7c272c 7608->7610 7611 7c0f82 7613 7c0fb7 ioctlsocket 7611->7613 7614 7c0fe3 7613->7614

                                                    Executed Functions

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 503 780a50-780a7b 504 780a7d 503->504 505 780a82-780a8c call 78335f 503->505 504->505 507 780a92-78318d 505->507 972 7831b9 507->972 973 78318f-78319b 507->973 974 7831bf-783357 972->974 975 78319d-7831a3 973->975 976 7831a5-7831b5 973->976 977 7831b7 975->977 976->977 977->974
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 8Rk$8Rk$8Rk$L[l$Xk
                                                    • API String ID: 0-1909057796
                                                    • Opcode ID: c1912dc2108e1fb7031d5f767a8173276086953981d4da88109a423a1ec162b5
                                                    • Instruction ID: 4a4f8444d5b71cf416f2e255d0c0f3408424cc3e4a2912fcb8b69159c611b467
                                                    • Opcode Fuzzy Hash: c1912dc2108e1fb7031d5f767a8173276086953981d4da88109a423a1ec162b5
                                                    • Instruction Fuzzy Hash: B8439334A01618CFCB64DF64C899BA9B7B2FF8A315F5041E9E549AB360DB316E85CF01
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 780a3f-780a7b 3 780a7d 0->3 4 780a82-780a8c call 78335f 0->4 3->4 6 780a92-78318d 4->6 471 7831b9 6->471 472 78318f-78319b 6->472 473 7831bf-783357 471->473 474 78319d-7831a3 472->474 475 7831a5-7831b5 472->475 476 7831b7 474->476 475->476 476->473
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 8Rk$8Rk$8Rk$L[l$Xk
                                                    • API String ID: 0-1909057796
                                                    • Opcode ID: cc824d06d5b740482a5390c4d96f4d8692f3f3d3ea09467ced1de057eec9fe25
                                                    • Instruction ID: 1c60913f35ad26aee3dc6b602c1c140330118e51e1427b6c49fd0e96bbe069b4
                                                    • Opcode Fuzzy Hash: cc824d06d5b740482a5390c4d96f4d8692f3f3d3ea09467ced1de057eec9fe25
                                                    • Instruction Fuzzy Hash: C2439334A01618CFCB64DF64C899BA9B7B2FF8A315F1041E9E549AB361DB316E85CF01
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1172 78335f-78337d 1174 78337f 1172->1174 1175 783384-783406 1172->1175 1174->1175 1183 783408 1175->1183 1184 78340d-78345f 1175->1184 1183->1184 1188 783480 1184->1188 1189 783461-78346a 1184->1189 1192 783483-78359c 1188->1192 1190 78346c-78346f 1189->1190 1191 783471-783474 1189->1191 1193 78347e 1190->1193 1191->1193 1193->1192
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :@}l$<z(
                                                    • API String ID: 0-1008631021
                                                    • Opcode ID: f1c4bae171aebae2db5dbaa2dd7f33e6066997b7c7811be59927e86218648966
                                                    • Instruction ID: e2ba676be9e8f8eee7f87c1ec966d21dd2ea4714c59bb4d3778c9ec72da8b704
                                                    • Opcode Fuzzy Hash: f1c4bae171aebae2db5dbaa2dd7f33e6066997b7c7811be59927e86218648966
                                                    • Instruction Fuzzy Hash: FF71C374E10208DFCF05DFE9C554AAEBBB2AF88304F248069D809AB365DB35AE45CF51
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • bind.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0E1B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: bind
                                                    • String ID:
                                                    • API String ID: 1187836755-0
                                                    • Opcode ID: 8371ddb7c04f70846a3dfc9e91fca7970d4e4f7a2cc7d1023c196578daaad637
                                                    • Instruction ID: c19577c354bad536a85a1c00c87e401bd8c72a262f1ffcd852b6dec1459d7378
                                                    • Opcode Fuzzy Hash: 8371ddb7c04f70846a3dfc9e91fca7970d4e4f7a2cc7d1023c196578daaad637
                                                    • Instruction Fuzzy Hash: EC219172509780AFD712CB61DC44F96BFB8EF46324F0884DAE944CF192D264A909CBB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.92%

                                                    APIs
                                                    • listen.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0A00
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: listen
                                                    • String ID:
                                                    • API String ID: 3257165821-0
                                                    • Opcode ID: 10278120935a7db781f624cdd4f308c509cc007b53ed3aead64479f327e0a691
                                                    • Instruction ID: 18c6b82fb434d5bd8a85c9f6f7d91da16038ddc409a5bd15f8e56a1691226317
                                                    • Opcode Fuzzy Hash: 10278120935a7db781f624cdd4f308c509cc007b53ed3aead64479f327e0a691
                                                    • Instruction Fuzzy Hash: 3421C775405384AFEB12CF50DC45F9ABFB8EF46324F0885DAE9449F193D3649905CBA1
                                                    Uniqueness

                                                    Uniqueness Score: 1.28%

                                                    APIs
                                                    • GetUserNameA.ADVAPI32(?,00000E38), ref: 007C2C6D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: c0be50cde94bdf1d7ce2e5184a8ba688038a5e50561bdf18a607fd95c330e75d
                                                    • Instruction ID: cad2dee11ee969c203bd8d4b8922c724253940465a852deb4b24852e202aea68
                                                    • Opcode Fuzzy Hash: c0be50cde94bdf1d7ce2e5184a8ba688038a5e50561bdf18a607fd95c330e75d
                                                    • Instruction Fuzzy Hash: 6811D272500204AEEB20DB55DC85FAEFBACEF54320F04886EE905CB241DB74A5058AB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.05%

                                                    APIs
                                                    • bind.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0E1B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: bind
                                                    • String ID:
                                                    • API String ID: 1187836755-0
                                                    • Opcode ID: 9402f1c53456fef5c427bf1f33c39eb2fba919e057b680b01e6c61538619a416
                                                    • Instruction ID: 92a6b2d92dc29ab2657132c4ec7a81191b669027f3dcdad50d6e15de8340a769
                                                    • Opcode Fuzzy Hash: 9402f1c53456fef5c427bf1f33c39eb2fba919e057b680b01e6c61538619a416
                                                    • Instruction Fuzzy Hash: 7C119072500204EFEB20DF55DC84F9AF7ACEF55724F04896AE9098B245D774E544CAF1
                                                    Uniqueness

                                                    Uniqueness Score: 0.92%

                                                    APIs
                                                    • listen.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0A00
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: listen
                                                    • String ID:
                                                    • API String ID: 3257165821-0
                                                    • Opcode ID: f1f52b3b0ade8512a05507e978cddf1076dabec901d967461e002d03602a3489
                                                    • Instruction ID: 90f5ea63d9fda12915df59d14ff2dd6e1825d2db23eaa82cbd9e522c388981d3
                                                    • Opcode Fuzzy Hash: f1f52b3b0ade8512a05507e978cddf1076dabec901d967461e002d03602a3489
                                                    • Instruction Fuzzy Hash: F311E072500204EEEB10CF55CC84FAAFBACEF95324F04C8AAE9089B245D678E5048AE1
                                                    Uniqueness

                                                    Uniqueness Score: 1.28%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 57093ff79d6dd04da8f29dd70cc6b73481c0b73a8a363ddb86a5acf3fe792c1e
                                                    • Instruction ID: 28d3857c8efbfadd7c641bd82f4fdd1dc828dc676f1b2bdf275aa6d4977fee3d
                                                    • Opcode Fuzzy Hash: 57093ff79d6dd04da8f29dd70cc6b73481c0b73a8a363ddb86a5acf3fe792c1e
                                                    • Instruction Fuzzy Hash: DC52F274D112288FDB64EF69C854BEDBBB6AF49304F2085E9D109AB290DB349EC4CF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 82842547dd50e8be45cfddc8a7f1f8b21e22e72cee0155436d9c170e438541d8
                                                    • Instruction ID: 015002991e1b05e60864ed6103709f5b0c609f1d2acfa82d5faa82a144829407
                                                    • Opcode Fuzzy Hash: 82842547dd50e8be45cfddc8a7f1f8b21e22e72cee0155436d9c170e438541d8
                                                    • Instruction Fuzzy Hash: 7A42F274D45228CFCB28DF61D8487E9B7B2BB4A305F6488A9C54A67350DB798AC6CF10
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c4bc86b193f3bcc1605066758c48a8a1b70118e3fff4bd2b3ab6b4108d24acab
                                                    • Instruction ID: 36f2d3fe909c8d232c0f42694194d6a55422db8a234f9648c8f700568ff9b3b5
                                                    • Opcode Fuzzy Hash: c4bc86b193f3bcc1605066758c48a8a1b70118e3fff4bd2b3ab6b4108d24acab
                                                    • Instruction Fuzzy Hash: B5320474D14228CFDB64EF65C854BEDBBB6AF49304F2085EAD109AB290DB349E84CF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a7caeecbc444b7d74a1ff0f75b022a2cec6aaea33a6a15dda320491ef6b63c67
                                                    • Instruction ID: cd4f636acf6be28e1e150982015e5cf9705685a68a1014821ef2ba8481b03915
                                                    • Opcode Fuzzy Hash: a7caeecbc444b7d74a1ff0f75b022a2cec6aaea33a6a15dda320491ef6b63c67
                                                    • Instruction Fuzzy Hash: B76125B4D041099FCF04EFE9C580AADFBF2BF89324F28C55AE514AB355DB3499418B61
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1004 780280-780290 1005 780292 1004->1005 1006 780297-7802c0 1004->1006 1005->1006 1007 7802dd 1006->1007 1008 7802c2-7802db 1006->1008 1009 7802e0-7802f7 1007->1009 1008->1009 1012 7802fd-780319 1009->1012 1013 780390-7803ac 1009->1013 1014 78031b-780334 1012->1014 1015 780336 1012->1015 1016 7803c9 1013->1016 1017 7803ae-7803c7 1013->1017 1018 780339 1014->1018 1015->1018 1019 7803cc-7803e1 1016->1019 1017->1019 1022 780340-78035f 1018->1022 1024 78037c 1022->1024 1025 780361-78037a 1022->1025 1027 78037f-780389 1024->1027 1025->1027 1027->1013
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: P`($P`($P`($P`(
                                                    • API String ID: 0-61198860
                                                    • Opcode ID: 0992e5f12c6ae663bcc34a15d2ec5ac47a6f1db37e5cf82ce817195a69e48ed8
                                                    • Instruction ID: ea8eb90379d3905f8aeed82e8b9662e74d7ee133e2ddb8090308fc10474d091f
                                                    • Opcode Fuzzy Hash: 0992e5f12c6ae663bcc34a15d2ec5ac47a6f1db37e5cf82ce817195a69e48ed8
                                                    • Instruction Fuzzy Hash: EE418B78A01208DFDF00DFA8C584AADBBF1BF4D314F1044A9E502AB3A0D735A945EF55
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1030 7805a8-7805d9 1031 7805db 1030->1031 1032 7805e0-780610 1030->1032 1031->1032 1033 780628 1032->1033 1034 780612-780626 1032->1034 1035 78062f-78063a 1033->1035 1034->1035 1036 7809ae-7809cb 1035->1036 1037 780640-78065a 1035->1037 1041 78072c-780756 1037->1041 1042 780660-780684 1037->1042 1053 780757-780778 1041->1053 1045 78068b-78068e 1042->1045 1046 780686-780689 1042->1046 1047 780691-7806bb 1045->1047 1046->1047 1054 7806bd-78071c 1047->1054 1055 780727-78072a 1047->1055 1058 78077a-78077d 1053->1058 1059 78077f-780782 1053->1059 1054->1055 1055->1053 1061 780785-7807b4 1058->1061 1059->1061 1066 7807cc 1061->1066 1067 7807b6-7807ca 1061->1067 1068 7807cf 1066->1068 1067->1068 1071 7807d6-780981 1068->1071 1074 780988-78098b 1071->1074 1075 780983-780986 1071->1075 1076 78098e-7809ab 1074->1076 1075->1076
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :@}l$\,($lc(
                                                    • API String ID: 0-3876432169
                                                    • Opcode ID: 8cebb6df4ffe9797ddfdb63a37f350ebddaeeee3fbd4fa1434ae8b3d90aa897c
                                                    • Instruction ID: 4ae6d6a648b45a170741ff47737ab41fef11099416a136bb2bd690c8b1bd7071
                                                    • Opcode Fuzzy Hash: 8cebb6df4ffe9797ddfdb63a37f350ebddaeeee3fbd4fa1434ae8b3d90aa897c
                                                    • Instruction Fuzzy Hash: 2991C074E01218CFDB54EFA8C994BDDBBB2BF49314F2040A9D409AB391DB35A989CF50
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1079 7839de-7839ff 1081 783a01-783a09 1079->1081 1082 783a16-783a1e 1079->1082 1083 783951-783b4f 1081->1083 1084 783a20-783a24 1082->1084 1089 783b55-783b5b 1083->1089 1086 783a2e-783a36 1084->1086 1087 783a26-783a2c 1084->1087 1088 783a38-783a3c 1086->1088 1087->1088 1090 783a48-783a4e 1088->1090 1091 783a3e-783a46 1088->1091 1092 783a82-783a8f 1089->1092 1093 783a50-783a54 1090->1093 1091->1093 1096 783a98-783aa0 1092->1096 1097 783a91 1092->1097 1094 783a7b-783a80 1093->1094 1095 783a56-783a78 1093->1095 1094->1096 1095->1094 1096->1092 1097->1096 1100 7839a8-7839cb 1097->1100 1101 783979-7839a6 1097->1101 1102 783aca-783ae3 1097->1102 1103 7839cd-7839db 1097->1103 1104 783a0e-783a14 1097->1104 1105 783b00-783b07 1097->1105 1106 783b60-783b67 1097->1106 1107 783aa2 1097->1107 1108 783b34 1097->1108 1109 783ae5 1097->1109 1100->1083 1101->1083 1102->1092 1103->1079 1104->1084 1116 783b0e-783b2f 1105->1116 1121 783aa5 call 7e081e 1107->1121 1122 783aa5 call 783ecc 1107->1122 1123 783aa5 call 7e07f8 1107->1123 1124 783aa5 call 783e84 1107->1124 1117 783b3d-783b47 1108->1117 1114 783aed-783afe 1109->1114 1114->1092 1116->1092 1117->1089 1118 783aab-783aae 1120 783ab7-783ac8 1118->1120 1120->1092 1121->1118 1122->1118 1123->1118 1124->1118
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 9$;$;
                                                    • API String ID: 0-765335408
                                                    • Opcode ID: f721ce20233b3311f15feb2fd16ebc9106704ba71bb1bc778f654f595ad3e211
                                                    • Instruction ID: 7fe3beac9892f60ea03b39740c9f26456f07ceaa3f62a25087e7e93eca042d47
                                                    • Opcode Fuzzy Hash: f721ce20233b3311f15feb2fd16ebc9106704ba71bb1bc778f654f595ad3e211
                                                    • Instruction Fuzzy Hash: 14511A70C8920ACFDB04EFA8D8846EDBBB5FF49704F20952AD055B7250E7785A89CF41
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1125 783b26 1126 783b27-783b2f 1125->1126 1127 783a82-783a8f 1126->1127 1128 783a98-783aa0 1127->1128 1129 783a91 1127->1129 1128->1127 1129->1128 1130 7839a8-7839cb 1129->1130 1131 783979-7839a6 1129->1131 1132 783aca-783ae3 1129->1132 1133 7839cd-7839ff 1129->1133 1134 783a0e-783a14 1129->1134 1135 783b00-783b07 1129->1135 1136 783b60-783b67 1129->1136 1137 783aa2 1129->1137 1138 783b34 1129->1138 1139 783ae5 1129->1139 1153 783951-783b4f 1130->1153 1131->1153 1132->1127 1164 783a01-783a09 1133->1164 1165 783a16-783a1e 1133->1165 1141 783a20-783a24 1134->1141 1147 783b0e-783b10 1135->1147 1168 783aa5 call 7e081e 1137->1168 1169 783aa5 call 783ecc 1137->1169 1170 783aa5 call 7e07f8 1137->1170 1171 783aa5 call 783e84 1137->1171 1148 783b3d-783b47 1138->1148 1145 783aed-783afe 1139->1145 1150 783a2e-783a36 1141->1150 1151 783a26-783a2c 1141->1151 1145->1127 1147->1126 1155 783b55-783b5b 1148->1155 1149 783aab-783aae 1156 783ab7-783ac8 1149->1156 1152 783a38-783a3c 1150->1152 1151->1152 1157 783a48-783a4e 1152->1157 1158 783a3e-783a46 1152->1158 1153->1155 1155->1127 1156->1127 1160 783a50-783a54 1157->1160 1158->1160 1162 783a7b-783a80 1160->1162 1163 783a56-783a78 1160->1163 1162->1128 1163->1162 1164->1153 1165->1141 1168->1149 1169->1149 1170->1149 1171->1149
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 9$;$;
                                                    • API String ID: 0-765335408
                                                    • Opcode ID: 385f3363a8df3de69119c006c724a22b96e7951443e70ac197e0465ece5183db
                                                    • Instruction ID: 9d1a715671acf8ae213102ce767f9b68188f1c27d82c91aacefed14ae72d68ab
                                                    • Opcode Fuzzy Hash: 385f3363a8df3de69119c006c724a22b96e7951443e70ac197e0465ece5183db
                                                    • Instruction Fuzzy Hash: 5A51F7B0C4920ACFDB14EFA8D8446EDBBB8FF49704F20912AD056B7251E7785A4ACF41
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1209 7800f7-780115 1211 78011c 1209->1211 1212 780117 1209->1212 1213 780126-780129 1211->1213 1212->1211 1228 78012c call 7e081e 1213->1228 1229 78012c call 7e07f8 1213->1229 1214 780132-7801d4 1228->1214 1229->1214
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Hb($a(
                                                    • API String ID: 0-446870321
                                                    • Opcode ID: ccb2cb3213d2b34ce35e8e8f23e1410f62205312273cb78f96376d9cbb02d769
                                                    • Instruction ID: ab500ae260403007a41c57c822f238acedb31680ba3da286c822b96325e10191
                                                    • Opcode Fuzzy Hash: ccb2cb3213d2b34ce35e8e8f23e1410f62205312273cb78f96376d9cbb02d769
                                                    • Instruction Fuzzy Hash: 29218E34D2214ACFCB00EBE4D44C69CBB72BF91308B1085B9D8099B295DB716E59CF96
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1230 780108-780115 1231 78011c-780129 1230->1231 1232 780117 1230->1232 1248 78012c call 7e081e 1231->1248 1249 78012c call 7e07f8 1231->1249 1232->1231 1234 780132-7801d4 1248->1234 1249->1234
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: Hb($a(
                                                    • API String ID: 0-446870321
                                                    • Opcode ID: 3dd33b036c61f23f1cbb09065df99b7c93269ebce1e3ccf5f754ef8f8256147b
                                                    • Instruction ID: 27d6fda08c399946447345601aa235af8e214c0da7521fa1f87a7a327fdcf2de
                                                    • Opcode Fuzzy Hash: 3dd33b036c61f23f1cbb09065df99b7c93269ebce1e3ccf5f754ef8f8256147b
                                                    • Instruction Fuzzy Hash: F0116D34D2100ACFCB04EBE4E54D69DB772FF90309B104578E8099B295DB716E54CF9A
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1250 26b729-26b75b 1252 26b77d-26b7af 1250->1252 1253 26b75d-26b77c 1250->1253 1256 26b7b2-26b80a RegQueryValueExW 1252->1256 1253->1252 1258 26b810-26b826 1256->1258
                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,?,?), ref: 0026B802
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: eb357f7d51dad594a86a82715ec19a30e78a945c3858125d3e248566d99c7c46
                                                    • Instruction ID: 1a10222f77bf3aa359a01d5de3d512f802bacc3ecbabf108daa7df28c1a571cf
                                                    • Opcode Fuzzy Hash: eb357f7d51dad594a86a82715ec19a30e78a945c3858125d3e248566d99c7c46
                                                    • Instruction Fuzzy Hash: 6A415C3550E3C0AFD3138B358C51A61BF74EF87620F0E85DBE8848B5A3D2256919D7B2
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1259 7c2658-7c26da 1263 7c26dc 1259->1263 1264 7c26df-7c26eb 1259->1264 1263->1264 1265 7c26ed 1264->1265 1266 7c26f0-7c26f9 1264->1266 1265->1266 1267 7c26fe-7c2715 1266->1267 1268 7c26fb 1266->1268 1270 7c2757-7c275c 1267->1270 1271 7c2717-7c272a RegCreateKeyExW 1267->1271 1268->1267 1270->1271 1272 7c272c-7c2754 1271->1272 1273 7c275e-7c2763 1271->1273 1273->1272
                                                    APIs
                                                    • RegCreateKeyExW.KERNEL32(?,00000E38), ref: 007C271D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: 305c567d4559b95a57019d61e60d8792c5a265d16985dc2ed2bf24c433f0a743
                                                    • Instruction ID: 0945837b67de4fd41635e27e3ec76bcab8e987ff03f0492e157f05be6a4ebb6c
                                                    • Opcode Fuzzy Hash: 305c567d4559b95a57019d61e60d8792c5a265d16985dc2ed2bf24c433f0a743
                                                    • Instruction Fuzzy Hash: 6631AF72504744AFEB21CB61CC44FA7BBACEF45310F08899EE985DB552D224E909CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.15%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1278 26b3ff-26b493 1283 26b495 1278->1283 1284 26b498-26b4b2 1278->1284 1283->1284 1286 26b4b4-26b4bc LsaLookupSids 1284->1286 1287 26b50c-26b511 1284->1287 1288 26b4c2-26b4d4 1286->1288 1287->1286 1290 26b4d6-26b509 1288->1290 1291 26b513-26b518 1288->1291 1291->1290
                                                    APIs
                                                    • LsaLookupSids.ADVAPI32(?,00000E38), ref: 0026B4BA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LookupSids
                                                    • String ID:
                                                    • API String ID: 2427636062-0
                                                    • Opcode ID: fd5a748ac8dc4536f12a16f0c4ad9e7e8e9dd38db90022ed0d61dad953867d21
                                                    • Instruction ID: 3cdc9dd0bee2f2155fd0f301413300d31077bdd6342f4bc4958dd92878272e17
                                                    • Opcode Fuzzy Hash: fd5a748ac8dc4536f12a16f0c4ad9e7e8e9dd38db90022ed0d61dad953867d21
                                                    • Instruction Fuzzy Hash: 60318172504244AFEB21CFA5CC44FABBBACEF55314F0849AAF944CB152D764E548CB71
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1296 7c339b-7c3443 1301 7c349b-7c34a0 1296->1301 1302 7c3445-7c344d DuplicateHandle 1296->1302 1301->1302 1303 7c3453-7c3465 1302->1303 1305 7c3467-7c3498 1303->1305 1306 7c34a2-7c34a7 1303->1306 1306->1305
                                                    APIs
                                                    • DuplicateHandle.KERNEL32(?,00000E38), ref: 007C344B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 2ed6380c083b467d536d3d95518615e97138b22c464774aa967589431b758e76
                                                    • Instruction ID: e847863cbbe7eabc1690daec01d89c7210f76ff44f5179fde6e28c0fe53d1072
                                                    • Opcode Fuzzy Hash: 2ed6380c083b467d536d3d95518615e97138b22c464774aa967589431b758e76
                                                    • Instruction Fuzzy Hash: 72319272404384AFE7128F61CC44FAABFACEF46324F04899AF945CB152D264A909DB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1310 26bbf3-26bc82 1314 26bc87-26bc93 1310->1314 1315 26bc84 1310->1315 1316 26bc95 1314->1316 1317 26bc98-26bca1 1314->1317 1315->1314 1316->1317 1318 26bcf2-26bcf7 1317->1318 1319 26bca3-26bcc7 CreateFileW 1317->1319 1318->1319 1322 26bcf9-26bcfe 1319->1322 1323 26bcc9-26bcef 1319->1323 1322->1323
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 0026BCA9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: df301741be83c894090dadd247d19c04880d9a735c2a7fe64b75a84c62260ee6
                                                    • Instruction ID: b588c31815a2a3405c59e5b6c4ea6c3481cd66ff9f9f78d45d25de78cb3f3565
                                                    • Opcode Fuzzy Hash: df301741be83c894090dadd247d19c04880d9a735c2a7fe64b75a84c62260ee6
                                                    • Instruction Fuzzy Hash: 31317EB2505380AFE722CF65CC44B66BFE8EF46314F08849AE9848B252D371E959CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1326 7c294c-7c29e3 1331 7c2a3b-7c2a40 1326->1331 1332 7c29e5-7c29ed DuplicateHandle 1326->1332 1331->1332 1334 7c29f3-7c2a05 1332->1334 1335 7c2a07-7c2a38 1334->1335 1336 7c2a42-7c2a47 1334->1336 1336->1335
                                                    APIs
                                                    • DuplicateHandle.KERNEL32(?,00000E38), ref: 007C29EB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 850cb800cf7ac1d276a98611ef8e330932022a1d1e3655a4a39236fde5891dfd
                                                    • Instruction ID: 02f3ae62dc0dfba5a16551823091194f13e292ee6c89e72fd55801121151e352
                                                    • Opcode Fuzzy Hash: 850cb800cf7ac1d276a98611ef8e330932022a1d1e3655a4a39236fde5891dfd
                                                    • Instruction Fuzzy Hash: F8318F72504344AFEB22CB61DC44FABBBACEF55324F0489AEF945CB152D264E9098B61
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    APIs
                                                    • RegOpenKeyExW.KERNEL32(?,00000E38), ref: 0026ABD5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: 29b0b646370a6d4e3aadf4f94ca9a082d591dc1034b9bbbfd12db82cfef0fa43
                                                    • Instruction ID: 91f2fbc67713c83fcc7dabf6d2f922ed7888ab0a570fbdf26ce8e07b10ab8499
                                                    • Opcode Fuzzy Hash: 29b0b646370a6d4e3aadf4f94ca9a082d591dc1034b9bbbfd12db82cfef0fa43
                                                    • Instruction Fuzzy Hash: DF31C472504380AFE722CF60CC45FA7BFBCEF56310F0889AAE9449B152D264E949CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • LsaLookupSids.ADVAPI32(?,00000E38), ref: 0026B4BA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LookupSids
                                                    • String ID:
                                                    • API String ID: 2427636062-0
                                                    • Opcode ID: 39eb0471931607a251fcb286c9475cb54ee5e3738059133a86f1907e776931d6
                                                    • Instruction ID: 3941f01795d5da5c3bba0386ddb7927764f826353ba85d515270d9be43451526
                                                    • Opcode Fuzzy Hash: 39eb0471931607a251fcb286c9475cb54ee5e3738059133a86f1907e776931d6
                                                    • Instruction Fuzzy Hash: CF218C72510204AEEB21DFA5CC84FABF7ACEF54314F04896AF945CA141E774E5888BB1
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: accept
                                                    • String ID:
                                                    • API String ID: 3005279540-0
                                                    • Opcode ID: 94bbaaed21461034f0d3819c7a23844a440357807bb30c9fdc32d47fbb27b05e
                                                    • Instruction ID: fd4d66b4fb4ad841310cabbedf439bc6de14967bd8945a67eab9427f54c17fb4
                                                    • Opcode Fuzzy Hash: 94bbaaed21461034f0d3819c7a23844a440357807bb30c9fdc32d47fbb27b05e
                                                    • Instruction Fuzzy Hash: 863181715093846FE712CB60DC45B96FFB8EF46314F0884AEE9848B253D375A908CB62
                                                    Uniqueness

                                                    Uniqueness Score: 23.02%

                                                    APIs
                                                    • GetUserNameA.ADVAPI32(?,00000E38), ref: 007C2C6D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: NameUser
                                                    • String ID:
                                                    • API String ID: 2645101109-0
                                                    • Opcode ID: 35bde422a0b99a6463164d2b8e32af93f8796332f65fb0d15582aeb5eb85eecb
                                                    • Instruction ID: 36ae2ff082b0c499deb2aeeb87c401331b564b3ca675a627b998bad23dfb877c
                                                    • Opcode Fuzzy Hash: 35bde422a0b99a6463164d2b8e32af93f8796332f65fb0d15582aeb5eb85eecb
                                                    • Instruction Fuzzy Hash: 2B31A0725093806FE7128B64DC55FAABFB8EF46310F08849FE944CB193D664A909C772
                                                    Uniqueness

                                                    Uniqueness Score: 0.05%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 0026ACD8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: a822ea78f34012d17321355e2956ec0d66f299d1f9741222ed6965c568b7a313
                                                    • Instruction ID: c7c9881119448c718d9c54ea4bde7295bda036f6f080e7f821a7c8fba90068d9
                                                    • Opcode Fuzzy Hash: a822ea78f34012d17321355e2956ec0d66f299d1f9741222ed6965c568b7a313
                                                    • Instruction Fuzzy Hash: 7131C272105780AFE722CF61CC45FA6BFBCEF46314F08849AE945DB152D260E949CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • CopyFileW.KERNEL32(?,?,?), ref: 007C30D6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CopyFile
                                                    • String ID:
                                                    • API String ID: 1304948518-0
                                                    • Opcode ID: bd6175069db35593f8a47fc90bfefd2ce344e3c8a78d9b295845e29d60676a83
                                                    • Instruction ID: f07c8ae7bbcffac658598edcb60b970433cedde5b3477515c7f66fe8bfcb49c4
                                                    • Opcode Fuzzy Hash: bd6175069db35593f8a47fc90bfefd2ce344e3c8a78d9b295845e29d60676a83
                                                    • Instruction Fuzzy Hash: E831507250D3C45FD7138B259C55B92BFB89F17214F0D84DFE884CB1A3E2299949C762
                                                    Uniqueness

                                                    Uniqueness Score: 0.26%

                                                    APIs
                                                    • GetProcessTimes.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0BD1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ProcessTimes
                                                    • String ID:
                                                    • API String ID: 1995159646-0
                                                    • Opcode ID: 9705cd216770a76139e6284b8a10eac75d8e1c9f0be821a6b1697e0f9e86dd3b
                                                    • Instruction ID: 2035ef55a05225ed2343f443f1a082f1816573b7cc9cfbb6518584668360d1a7
                                                    • Opcode Fuzzy Hash: 9705cd216770a76139e6284b8a10eac75d8e1c9f0be821a6b1697e0f9e86dd3b
                                                    • Instruction Fuzzy Hash: 0031D7B2505780AFDB128F60DC45F96BFB8EF56314F0885DEE984CB153D2249945CBB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.67%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileView
                                                    • String ID:
                                                    • API String ID: 3314676101-0
                                                    • Opcode ID: 8826bf46d842329f79402d06abbb833fdd5cf35ab3175c781e5a42682d33e385
                                                    • Instruction ID: 9d97c0a8bb1f088b8a9db4dbc65a979414fc7dfd460ba7ccf31970a13c8ed8ff
                                                    • Opcode Fuzzy Hash: 8826bf46d842329f79402d06abbb833fdd5cf35ab3175c781e5a42682d33e385
                                                    • Instruction Fuzzy Hash: 3531B172009380AFE722CF61DC44F96FFB8EF16214F08449EE9848B252D365A948CBA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.53%

                                                    APIs
                                                    • GetTokenInformation.KERNELBASE(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 0026B06C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: InformationToken
                                                    • String ID:
                                                    • API String ID: 4114910276-0
                                                    • Opcode ID: 83823b381aa933debad2359d5bf591baa3901d7c13c0ccba53dce3e71efc3182
                                                    • Instruction ID: 04aa58e6e3028fc38e9096b2cefa8de62acfbd7f412665807cb6245f7a8aa2a3
                                                    • Opcode Fuzzy Hash: 83823b381aa933debad2359d5bf591baa3901d7c13c0ccba53dce3e71efc3182
                                                    • Instruction Fuzzy Hash: 3C31B172109780AFD712CF60CC44F9BBFBCEF46214F0884ABE944CB152D224A948CB72
                                                    Uniqueness

                                                    Uniqueness Score: 0.09%

                                                    APIs
                                                    • RegCreateKeyExW.KERNEL32(?,00000E38), ref: 007C271D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Create
                                                    • String ID:
                                                    • API String ID: 2289755597-0
                                                    • Opcode ID: e4e10b452d06dcc89fa90ab5ff4a9bc626dec6bbc51d2fa2146d3a525dc1fbdc
                                                    • Instruction ID: 7bdd608f2136dc6761c433b235a29ab742bf9a29d29d408d8819ebd3e12940db
                                                    • Opcode Fuzzy Hash: e4e10b452d06dcc89fa90ab5ff4a9bc626dec6bbc51d2fa2146d3a525dc1fbdc
                                                    • Instruction Fuzzy Hash: 97219E72100604AFEB20CE65CC84FABFBECEF54314F04896EEA45D6542E724E9098A71
                                                    Uniqueness

                                                    Uniqueness Score: 0.15%

                                                    APIs
                                                    • LsaOpenPolicy.ADVAPI32(?,00000E38), ref: 0026B38F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: OpenPolicy
                                                    • String ID:
                                                    • API String ID: 2030686058-0
                                                    • Opcode ID: f37bf868bdbbd70bfcf3f3e0eb0ae2fe2dad7bee6e8c850a6aac2b9cd4315d33
                                                    • Instruction ID: eeabac2305dc525d1b9588dc553509f31ba567e53adac54e4752f985a4583077
                                                    • Opcode Fuzzy Hash: f37bf868bdbbd70bfcf3f3e0eb0ae2fe2dad7bee6e8c850a6aac2b9cd4315d33
                                                    • Instruction Fuzzy Hash: 65218472504344AFE711CF64DC44FAAFBBCEF45310F08889AF944DB152D364A554CB61
                                                    Uniqueness

                                                    Uniqueness Score: 37.75%

                                                    APIs
                                                    • CreateMutexW.KERNEL32(?,?), ref: 007C0915
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateMutex
                                                    • String ID:
                                                    • API String ID: 1964310414-0
                                                    • Opcode ID: 0ce9e7a8574d29a93039a45797f2bd02d73f59d03699a4ab96be80543e823fc1
                                                    • Instruction ID: 3e8a135b88a63aaef55c7451f1d35d52265fe43097dd07fa491e35760d320b99
                                                    • Opcode Fuzzy Hash: 0ce9e7a8574d29a93039a45797f2bd02d73f59d03699a4ab96be80543e823fc1
                                                    • Instruction Fuzzy Hash: D33141B1509780AFE711CB65CC45F56FFF8AF46314F0884AEE9448B252D375E948CBA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • CreatePipe.KERNEL32(?,00000E38,?,?), ref: 007C2916
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreatePipe
                                                    • String ID:
                                                    • API String ID: 2719314638-0
                                                    • Opcode ID: 146af8d3bbef12047c48bb900fd24f00c2ef52f4de8dbb60f4f0909acbb5e323
                                                    • Instruction ID: 6f8fefebf7574862060148362e8c1f98761ddddbcf21811bd28eef13fca254b4
                                                    • Opcode Fuzzy Hash: 146af8d3bbef12047c48bb900fd24f00c2ef52f4de8dbb60f4f0909acbb5e323
                                                    • Instruction Fuzzy Hash: 1531417150E3C06FD7138B758C55A56BFB8EF47610F1984DBE888CF293D224A919C7A2
                                                    Uniqueness

                                                    Uniqueness Score: 0.77%

                                                    APIs
                                                    • RegSetValueExW.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C2814
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID:
                                                    • API String ID: 3702945584-0
                                                    • Opcode ID: 157ec89e7a920c9c6d3a57d131ac533cc7d091334cdb0c66926ced443e5d57ee
                                                    • Instruction ID: fa575d30ff2798614bc0db7aeed9a827aa5161aa6d32ae2e28c1bd1dc773bce2
                                                    • Opcode Fuzzy Hash: 157ec89e7a920c9c6d3a57d131ac533cc7d091334cdb0c66926ced443e5d57ee
                                                    • Instruction Fuzzy Hash: A931C372409780AFD7228B608C55F97FFB8AF56310F0889DEE9858B1A3D264E549C761
                                                    Uniqueness

                                                    Uniqueness Score: 0.19%

                                                    APIs
                                                    • WSAEventSelect.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C11C6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: EventSelect
                                                    • String ID:
                                                    • API String ID: 31538577-0
                                                    • Opcode ID: 22c57455b4ad2fc2d638eec7caec479bed4a415c6c7d8103ae5da08c2cbde418
                                                    • Instruction ID: ceba0aef8687967803b121799e251fc97612a87ae109c5b027c09a3e8872eab3
                                                    • Opcode Fuzzy Hash: 22c57455b4ad2fc2d638eec7caec479bed4a415c6c7d8103ae5da08c2cbde418
                                                    • Instruction Fuzzy Hash: 26218072409384AFD712CB618C44F9ABFBCAF46324F0985EBE984DB153D224A548CBB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.67%

                                                    APIs
                                                    • SetNamedSecurityInfoW.ADVAPI32(?,?,?,?,?,?,?), ref: 007C300A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: InfoNamedSecurity
                                                    • String ID:
                                                    • API String ID: 1443090519-0
                                                    • Opcode ID: eff4f9d75887f674d012bac76dce59550bd28c80c3b3a404894f14eb9c5d55c6
                                                    • Instruction ID: 2ce96cecb18c6d34fcef61a9223cd1b1147708b161c0e282d7687501a39978f8
                                                    • Opcode Fuzzy Hash: eff4f9d75887f674d012bac76dce59550bd28c80c3b3a404894f14eb9c5d55c6
                                                    • Instruction Fuzzy Hash: E63149766047849FDB21CF25CC44F52FBF8EF46710F08849EE949CB262E224E949CB61
                                                    Uniqueness

                                                    Uniqueness Score: 4.65%

                                                    APIs
                                                    • CreateFileMappingW.KERNELBASE(?,00000E38,?,?), ref: 007C138A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateFileMapping
                                                    • String ID:
                                                    • API String ID: 524692379-0
                                                    • Opcode ID: 6cd77fcb7ef208738b9d93dd82882a7d1cb68144b9f0bffd48e49ba8139e1b23
                                                    • Instruction ID: 7d9d751ac334ced40eb065342b3898de8a0d8b5d548558a48a794fed8b40efed
                                                    • Opcode Fuzzy Hash: 6cd77fcb7ef208738b9d93dd82882a7d1cb68144b9f0bffd48e49ba8139e1b23
                                                    • Instruction Fuzzy Hash: 0A3193725097C05FD312CB65DC55B62BFB8EF87610F0A81DBE8848F693D224A919C7A2
                                                    Uniqueness

                                                    Uniqueness Score: 3.53%

                                                    APIs
                                                    • FindWindowA.USER32(?,00000E38), ref: 007C2D6E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FindWindow
                                                    • String ID:
                                                    • API String ID: 134000473-0
                                                    • Opcode ID: 85eba09b8f995057fb45aacdf6e9492d55d7ddddd40ce566e531b023571976cc
                                                    • Instruction ID: 3ca79c946b94d4beabf3e26180dc1de926b6b8025dfbddcb8477f6d184d127e0
                                                    • Opcode Fuzzy Hash: 85eba09b8f995057fb45aacdf6e9492d55d7ddddd40ce566e531b023571976cc
                                                    • Instruction Fuzzy Hash: 1F21B671409380AFE7128B50CC45F96BFB8EF56320F0884DAF9449F192D278A949CB71
                                                    Uniqueness

                                                    Uniqueness Score: 1.40%

                                                    APIs
                                                    • DuplicateHandle.KERNEL32(?,00000E38), ref: 007C29EB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: dc98583958b0d2528d50bc53831519394bd7fbb92eb769f436c5e3e297956f1a
                                                    • Instruction ID: c2ba4fd938879473a35f0bee73e68f9002b88f7e4e8343144a1d4909a653b5d3
                                                    • Opcode Fuzzy Hash: dc98583958b0d2528d50bc53831519394bd7fbb92eb769f436c5e3e297956f1a
                                                    • Instruction Fuzzy Hash: A621B272500204AFEB21CFA1CC44FABFBACEF54324F04896EF945C6551D775E5498BA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    APIs
                                                    • DuplicateHandle.KERNEL32(?,00000E38), ref: 007C344B
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: e9c23845d44d76a18873884d76d4378a0f07d26025696714f024b7cd4c056755
                                                    • Instruction ID: 6de9a4753791e45a4ed9b9e2722cec44e6f7883b0c1bc4512659c1803dffecd9
                                                    • Opcode Fuzzy Hash: e9c23845d44d76a18873884d76d4378a0f07d26025696714f024b7cd4c056755
                                                    • Instruction Fuzzy Hash: BF21C172500204AFEB21CFA5CC44FABFBACEF54324F04896EF945CA141D774E6498B61
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    APIs
                                                    • SetThreadContext.KERNEL32(?,?), ref: 007C3617
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ContextThread
                                                    • String ID:
                                                    • API String ID: 1591575202-0
                                                    • Opcode ID: 783a3918b7ac89403ea1af075248d27f9399745fa47055514e9e3784a1f59d5d
                                                    • Instruction ID: 8b39f8a221294cc5e3b32ba6a35ac0db7b102b44a3eb38f5f76a7dd36e234b78
                                                    • Opcode Fuzzy Hash: 783a3918b7ac89403ea1af075248d27f9399745fa47055514e9e3784a1f59d5d
                                                    • Instruction Fuzzy Hash: F031297550E3C49FD7138B25DC99A51BFB4AF13314F0A80DFD8858F2A3D268A909CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.60%

                                                    APIs
                                                    • OpenFileMappingW.KERNELBASE(?,?), ref: 007C0491
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileMappingOpen
                                                    • String ID:
                                                    • API String ID: 1680863896-0
                                                    • Opcode ID: 901d45134425068465fdcd8308df210d65c26eea6781525d48dbd3f412e9e1e2
                                                    • Instruction ID: ff9350137a89e7058bc732377c49c2837308dd45ec0c511dfeba9375aac470f1
                                                    • Opcode Fuzzy Hash: 901d45134425068465fdcd8308df210d65c26eea6781525d48dbd3f412e9e1e2
                                                    • Instruction Fuzzy Hash: 25217171505380AFE721CB65DC45F66FFA8EF46714F0884AEE9448B252D375E904CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.68%

                                                    APIs
                                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 0026B8BA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Socket
                                                    • String ID:
                                                    • API String ID: 38366605-0
                                                    • Opcode ID: 3e0819e41f585441e705cd59546198628f8df685f27aefc667ffd547267ca341
                                                    • Instruction ID: e21a64c59ce80b32257c1b96560471191cf8cd59fbaeeb34dad7aab928b65283
                                                    • Opcode Fuzzy Hash: 3e0819e41f585441e705cd59546198628f8df685f27aefc667ffd547267ca341
                                                    • Instruction Fuzzy Hash: 79218271409780AFE722CF51DC45F96FFB8EF45310F08849EE9858B252D375A458CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.66%

                                                    APIs
                                                    • DeleteFileW.KERNEL32(?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C3530
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DeleteFile
                                                    • String ID:
                                                    • API String ID: 4033686569-0
                                                    • Opcode ID: 81e97a63257acb773ca928d6031d997067bbba3ce537455ff0cb3abf20af427f
                                                    • Instruction ID: a0175253e424932cc5e54ba752bdf412a30b9068267b01f163107e224fbf5495
                                                    • Opcode Fuzzy Hash: 81e97a63257acb773ca928d6031d997067bbba3ce537455ff0cb3abf20af427f
                                                    • Instruction Fuzzy Hash: 83219C725097C09FDB12CB35DC55B92BFA49F47320F0D84DAE9848F263D625AA08CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 0026BCA9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: b65ecfd1ae6f30c2be5a34d51c69512ad3e62fe5e1448a07a031d8660548051e
                                                    • Instruction ID: ca557dc6c77424df04c4eb662bdedf1e6f4aeb68d7328024d096a62ebc2865f4
                                                    • Opcode Fuzzy Hash: b65ecfd1ae6f30c2be5a34d51c69512ad3e62fe5e1448a07a031d8660548051e
                                                    • Instruction Fuzzy Hash: D721AE71500300AFEB21CF65CC44B66FBE8EF59314F04886AE945CB252D771E998CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • GetFileType.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 0026BD95
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileType
                                                    • String ID:
                                                    • API String ID: 3081899298-0
                                                    • Opcode ID: 24a72b960f45163ab206508e02e62efd3045ae1d9d13a8cbf8c81101847c8bef
                                                    • Instruction ID: b9824639af0889c98b44cb0ac2ebf9d9e2b7bd33dc003059f878bb30033b8b86
                                                    • Opcode Fuzzy Hash: 24a72b960f45163ab206508e02e62efd3045ae1d9d13a8cbf8c81101847c8bef
                                                    • Instruction Fuzzy Hash: 3021F8B6408780AFE7128B259C44BA7BFBCEF46324F08859AE9848B153D364A945CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C01FC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 3e753ad9db4940f768b2e296307f27e12ecbdeb5d8d8fd244bac7720030489b7
                                                    • Instruction ID: 722b367e3d593cae02c4cf7143b4d535f27371efc2972281693cc5f756ec01d4
                                                    • Opcode Fuzzy Hash: 3e753ad9db4940f768b2e296307f27e12ecbdeb5d8d8fd244bac7720030489b7
                                                    • Instruction Fuzzy Hash: A821BD72105740AFE722CF51CC44F97FBBCEF45320F08849EEA459B292D264E908CBA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • RegOpenKeyExW.KERNEL32(?,00000E38), ref: 0026ABD5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: 9c0a45689361750a5b98acef0997c13d16cc9495a91fc1c808b72f16b18b7914
                                                    • Instruction ID: a04690a4e12e2f7cd486444dd04675f3d12aff67bec9263cb25cbf09371d4e44
                                                    • Opcode Fuzzy Hash: 9c0a45689361750a5b98acef0997c13d16cc9495a91fc1c808b72f16b18b7914
                                                    • Instruction Fuzzy Hash: 5021D172510704AFEB20DF51DC44FABF7ACEF64324F04896AE90596141E770E958CEB2
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • getsockname.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0EFF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: getsockname
                                                    • String ID:
                                                    • API String ID: 3358416759-0
                                                    • Opcode ID: 812edf07dc7e14a1ed609499654592ed627a99392926f1ee69f369888203fddb
                                                    • Instruction ID: 9355172f30d6b44d9f2e6215bc1e192206dd634a38b169a2687205d7cc1b223b
                                                    • Opcode Fuzzy Hash: 812edf07dc7e14a1ed609499654592ed627a99392926f1ee69f369888203fddb
                                                    • Instruction Fuzzy Hash: 16217172509384AFD721CB55CC44F9ABFBCEF46320F08859AE9489B152D264E944CBB1
                                                    Uniqueness

                                                    Uniqueness Score: 1.37%

                                                    APIs
                                                    • LoadLibraryA.KERNEL32(?,00000E38), ref: 007C2183
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 3c1232f56aa0c96e5322e5a53cf962814332312f26fb3699ab1936c641a703ea
                                                    • Instruction ID: e47f7ab73f8ee3ab0ebed5d8ac825c1b5e43d4c0508b9297ff58fafaba7f7279
                                                    • Opcode Fuzzy Hash: 3c1232f56aa0c96e5322e5a53cf962814332312f26fb3699ab1936c641a703ea
                                                    • Instruction Fuzzy Hash: AA21C8714453846FE712CB10DD45FA6FFB8DF42720F0880DAE9849F193D269A949C7B2
                                                    Uniqueness

                                                    Uniqueness Score: 0.02%

                                                    APIs
                                                    • ReadFile.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 0026BF31
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: cf28aec8e7742c1b1384b007cdfa17b93a977ddb986391bd4a4e998b4b72278f
                                                    • Instruction ID: 7d8a9db7824e065e7361036c68a7d3e4642f6eb730c2d4e1d04691df845d556c
                                                    • Opcode Fuzzy Hash: cf28aec8e7742c1b1384b007cdfa17b93a977ddb986391bd4a4e998b4b72278f
                                                    • Instruction Fuzzy Hash: 6221CF72405340AFEB228F51DC44FA7BBACEF85724F04899AF9448B152D264A948CBB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.02%

                                                    APIs
                                                    • LsaOpenPolicy.ADVAPI32(?,00000E38), ref: 0026B38F
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: OpenPolicy
                                                    • String ID:
                                                    • API String ID: 2030686058-0
                                                    • Opcode ID: 1f7e39084c129384316c9b3920280ba191ac502260aa98b10a84532b7634e61c
                                                    • Instruction ID: 3e76f599c807ad91c8bbf8d33c854b0177a4e175ae5f45e44ac5a76449b703b3
                                                    • Opcode Fuzzy Hash: 1f7e39084c129384316c9b3920280ba191ac502260aa98b10a84532b7634e61c
                                                    • Instruction Fuzzy Hash: 6B21C372610204AFEB21DFA5DC45FABFBACEF55310F0488AAFD04CA641D770E5588A71
                                                    Uniqueness

                                                    Uniqueness Score: 37.75%

                                                    APIs
                                                    • CreateMutexW.KERNEL32(?,?), ref: 007C0915
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateMutex
                                                    • String ID:
                                                    • API String ID: 1964310414-0
                                                    • Opcode ID: fe848e6dac8ccdc05fb563a913df17df6ce3604b9f0ba3e59417130aad9a85ec
                                                    • Instruction ID: 028fc69b2ad85f2cd86d93deea25817658cd8339832ee26cc9cfeb22a240ce8f
                                                    • Opcode Fuzzy Hash: fe848e6dac8ccdc05fb563a913df17df6ce3604b9f0ba3e59417130aad9a85ec
                                                    • Instruction Fuzzy Hash: 83218E71500244AFE720DF65CD85FA6FBE8EF59714F08846EE9488B246D375E908CAA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • GetFileAttributesExW.KERNEL32(?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 0026BBAA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: fb9655cb4dd49aa50b4b638a7d735078b3a4140dbb83c181f09b621a7b27b81a
                                                    • Instruction ID: ae5d5b1c3ac68410ccc37b46ac27723c71b5f26740a3719ccc969849afe80504
                                                    • Opcode Fuzzy Hash: fb9655cb4dd49aa50b4b638a7d735078b3a4140dbb83c181f09b621a7b27b81a
                                                    • Instruction Fuzzy Hash: 8021AC765093809FDB12CF25DC45B92BFB8EF07314F0984EAE984CB263D224A858CB61
                                                    Uniqueness

                                                    Uniqueness Score: 6.12%

                                                    APIs
                                                    • ioctlsocket.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0FDB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ioctlsocket
                                                    • String ID:
                                                    • API String ID: 3577187118-0
                                                    • Opcode ID: beebbf5c81ada5f9a016ce73e94bff65ed7110e8c4b3237cd032126a44717664
                                                    • Instruction ID: 46b4d205bfe72643445a0eacc875d459efed0637797277177c21bed1d5dc378d
                                                    • Opcode Fuzzy Hash: beebbf5c81ada5f9a016ce73e94bff65ed7110e8c4b3237cd032126a44717664
                                                    • Instruction Fuzzy Hash: E621A472409384AFDB12CF50CC44F9AFFB8EF46314F08849AF9449B152D274A544CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.45%

                                                    APIs
                                                    • GetTokenInformation.KERNELBASE(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 0026B06C
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: InformationToken
                                                    • String ID:
                                                    • API String ID: 4114910276-0
                                                    • Opcode ID: 5dabfee6c6494c341db72e4e08ed492d4fddc9c00a00753881be9608ee2e3435
                                                    • Instruction ID: 286d24fbb038e3206be6a538fbb8086240f9ede166a9b71da8a3d985e9fa9743
                                                    • Opcode Fuzzy Hash: 5dabfee6c6494c341db72e4e08ed492d4fddc9c00a00753881be9608ee2e3435
                                                    • Instruction Fuzzy Hash: 2B11C372510204AFEB218F51CC44FABFBACEF54324F04896AE905CA255E771E5988BB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.09%

                                                    APIs
                                                    • setsockopt.WS2_32(?,?,?,?,?), ref: 0026B990
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: setsockopt
                                                    • String ID:
                                                    • API String ID: 3981526788-0
                                                    • Opcode ID: 0b187dc9dc3bd8679fcd3b3828acfd9a7c3ab0ca039199c125ec8a5c70e75b27
                                                    • Instruction ID: 690ff3da5bf2b906cd24f7d958f0d3802b5d495c86d34f135201465280e6824a
                                                    • Opcode Fuzzy Hash: 0b187dc9dc3bd8679fcd3b3828acfd9a7c3ab0ca039199c125ec8a5c70e75b27
                                                    • Instruction Fuzzy Hash: A2218C724093C0AFDB128F61DC44A92BFB4EF47320F0985DAE9848B563C3359959CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.42%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 0026ACD8
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 48b615bc0eebf74fafe5d01875325010cb4357653719928123ef456b2ba7b480
                                                    • Instruction ID: 9e3e67afe708174c1bf8d730f6841aa4be291d0a3af43c3daf015c89a467247e
                                                    • Opcode Fuzzy Hash: 48b615bc0eebf74fafe5d01875325010cb4357653719928123ef456b2ba7b480
                                                    • Instruction Fuzzy Hash: 3B21C071210604AFEB20CF51CC80FA6F7ECEF55710F04855AE905DB251D760E958CEB2
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: accept
                                                    • String ID:
                                                    • API String ID: 3005279540-0
                                                    • Opcode ID: 15f3893332a6059804f28fac3d7fa489e5cdcb2ac6a83e1bb9be1232d5d91b24
                                                    • Instruction ID: de895037752c1a120688cd52266ef1e59e8c8795668ff541bbf1e3e8519fd43d
                                                    • Opcode Fuzzy Hash: 15f3893332a6059804f28fac3d7fa489e5cdcb2ac6a83e1bb9be1232d5d91b24
                                                    • Instruction Fuzzy Hash: CC21F371100244AFE720CF95CC45FA6FBE8EF45324F14846EED448B242D375E844CA72
                                                    Uniqueness

                                                    Uniqueness Score: 23.02%

                                                    APIs
                                                    • OpenFileMappingW.KERNELBASE(?,?), ref: 007C0491
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileMappingOpen
                                                    • String ID:
                                                    • API String ID: 1680863896-0
                                                    • Opcode ID: 91b6d0c72c9d114ca5d9ee2794d7eb51a43c2240d9c61be1138928e6dfc69c0a
                                                    • Instruction ID: 26635dfe692b556022df70f0c5fc7572d2fb4762798882a3f9ca4ad15b168cb7
                                                    • Opcode Fuzzy Hash: 91b6d0c72c9d114ca5d9ee2794d7eb51a43c2240d9c61be1138928e6dfc69c0a
                                                    • Instruction Fuzzy Hash: 1E21A171500340AFEB24DFA5CC85FA6FBE8EF56724F04886EED448B241D375E904CAA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.68%

                                                    APIs
                                                    • WriteProcessMemory.KERNEL32(?,?,?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C3780
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: 6f5c3b379d1fa5e04dc0bfcf258d6e09967012625a5474c5816086259b24f665
                                                    • Instruction ID: 648a3642fe2e8ae964e51555f725520ee57ac99a1e74b2f2530f1baedbfb0dcf
                                                    • Opcode Fuzzy Hash: 6f5c3b379d1fa5e04dc0bfcf258d6e09967012625a5474c5816086259b24f665
                                                    • Instruction Fuzzy Hash: 9921C2B61097C09FDB12CF25DC85A92FFB4EF07320F0980DEE9858B563D224A948DB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.04%

                                                    APIs
                                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 0026B8BA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Socket
                                                    • String ID:
                                                    • API String ID: 38366605-0
                                                    • Opcode ID: 303acdf5fc4d666aff6ce591cc9211c1a2948d3b59cde075cce1f4e35a87a81c
                                                    • Instruction ID: 2661f32673373d600c607a530ecee3a4db8ff783ba2ed55ed69ae62602628b79
                                                    • Opcode Fuzzy Hash: 303acdf5fc4d666aff6ce591cc9211c1a2948d3b59cde075cce1f4e35a87a81c
                                                    • Instruction Fuzzy Hash: 5321D171505240AFEB21CFA1DC45B9AFBE8EF49324F04886EEA458B251D371E458CF61
                                                    Uniqueness

                                                    Uniqueness Score: 0.66%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileView
                                                    • String ID:
                                                    • API String ID: 3314676101-0
                                                    • Opcode ID: 9c2d44833d6a031453ce5a162e0a64c3a0ba264fb27d1420836b6b51fd645183
                                                    • Instruction ID: fd9a7a5579c22c27f33679a01ce3d6d240cf5e54f9ec54cf175ba1e0cc08aba5
                                                    • Opcode Fuzzy Hash: 9c2d44833d6a031453ce5a162e0a64c3a0ba264fb27d1420836b6b51fd645183
                                                    • Instruction Fuzzy Hash: 44219D72100204AFEB21CF95DD45FAAFBE8EF59324F04886EE9458B241D775E918CFA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.53%

                                                    APIs
                                                    • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 007C16F1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoadShim
                                                    • String ID:
                                                    • API String ID: 1475914169-0
                                                    • Opcode ID: 2635725ada6d12fe6ce6747fdf3e551e83d9ec5d2719643590f32226d8c8fc49
                                                    • Instruction ID: 8ce5903e927183f9ab3eb8a4dc44afa1e6cbd9e6e5cf3f08cfe399e79fcf486a
                                                    • Opcode Fuzzy Hash: 2635725ada6d12fe6ce6747fdf3e551e83d9ec5d2719643590f32226d8c8fc49
                                                    • Instruction Fuzzy Hash: 122190765093809FDB22CE25DC45B62BFB8EF56314F09809EED848B253D265E908CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.65%

                                                    APIs
                                                    • SetNamedSecurityInfoW.ADVAPI32(?,?,?,?,?,?,?), ref: 007C300A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: InfoNamedSecurity
                                                    • String ID:
                                                    • API String ID: 1443090519-0
                                                    • Opcode ID: a47025deafbf7c9b7d3a91b5fd6334ef6ac410c1194d4f1dc82dc424368fd0e7
                                                    • Instruction ID: d2698e20e584eef95a2f33cc8ebf442502efd874d01819743a3332142fbfdf60
                                                    • Opcode Fuzzy Hash: a47025deafbf7c9b7d3a91b5fd6334ef6ac410c1194d4f1dc82dc424368fd0e7
                                                    • Instruction Fuzzy Hash: 632130766002449FDB20CF66C884F52F7E8EF14710F0884AEE949CB252D375E945CB61
                                                    Uniqueness

                                                    Uniqueness Score: 4.65%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C01FC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 5a66bcad1d32451508c347757a6970beba505222906dc3e565ad5a2551ad74ff
                                                    • Instruction ID: ab29bf9b5c8c5bc61027d964b45b486ec960ba41e7dbdc00206cd4887bd4bbd5
                                                    • Opcode Fuzzy Hash: 5a66bcad1d32451508c347757a6970beba505222906dc3e565ad5a2551ad74ff
                                                    • Instruction Fuzzy Hash: 7111AF72100704EFEB21CE51DC84FABF7ACEF54720F08895EEA459A251D764E948CAB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • GetProcessTimes.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0BD1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ProcessTimes
                                                    • String ID:
                                                    • API String ID: 1995159646-0
                                                    • Opcode ID: ab8a17e93763d08cb5cbd9ceca53f50e52e25e0715b6aef06f693032fe0e33ba
                                                    • Instruction ID: c842df2130a85b21beb2d11d13e54c08a055baa98107dfef8efa7edb5e3058a7
                                                    • Opcode Fuzzy Hash: ab8a17e93763d08cb5cbd9ceca53f50e52e25e0715b6aef06f693032fe0e33ba
                                                    • Instruction Fuzzy Hash: 7511BE72100604EFEB208F95DC84FAAFBACEF55324F04896EE9058B255D775E9488BB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.67%

                                                    APIs
                                                    • WSAEventSelect.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C11C6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: EventSelect
                                                    • String ID:
                                                    • API String ID: 31538577-0
                                                    • Opcode ID: 966a962543c545533858d067a24c50f2a8373e1d67fba8da0bfecb79a9484d0e
                                                    • Instruction ID: c5961f83d1ae25f49e17495d34b961fe0b275e9bd2b94e32c4d4284a51b4afc9
                                                    • Opcode Fuzzy Hash: 966a962543c545533858d067a24c50f2a8373e1d67fba8da0bfecb79a9484d0e
                                                    • Instruction Fuzzy Hash: 2611B276500204AFEB10CF91CC84F9AF7ACEF95324F14896BEA09DB245E774E504CAB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.67%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Atom
                                                    • String ID:
                                                    • API String ID: 2154973765-0
                                                    • Opcode ID: 2642c7f3153f0c664b25d329f9fd72b3b4ac247b9c3c2f818f2ee7c9a85f65c1
                                                    • Instruction ID: dc9319d44763cd78cfe9f71648dab7478cdf01cab3426c5ffa46f41eb05a3d31
                                                    • Opcode Fuzzy Hash: 2642c7f3153f0c664b25d329f9fd72b3b4ac247b9c3c2f818f2ee7c9a85f65c1
                                                    • Instruction Fuzzy Hash: 5F116D715093809FDB12CB25DC55B52BFB8DF47720F0880EAED849F253D669A908CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.38%

                                                    APIs
                                                    • ResumeThread.KERNEL32(?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 0026A6CC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: b7e8f66eac3a7fe2ae5fe0d54f5f143a26ada9a6f61b10c2de20d475882ff583
                                                    • Instruction ID: 8a33cc2436ebc10cd86e0afd56c4031d2ede93e45d247a1778c96a074bfe8b03
                                                    • Opcode Fuzzy Hash: b7e8f66eac3a7fe2ae5fe0d54f5f143a26ada9a6f61b10c2de20d475882ff583
                                                    • Instruction Fuzzy Hash: 2921366140E3C45FDB128B25DC54A62BFB49F47624F0D80DBED849B2A3D2699948CB72
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 007C38D5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: 88331131991ed09d9f362c0ad90294273b3c7280646c35da2d043e0cd633a02d
                                                    • Instruction ID: 9dbdf861f8fb19d053ee8aa5f9aba54225c9e23f4b40b9fefbac60fe9be7e244
                                                    • Opcode Fuzzy Hash: 88331131991ed09d9f362c0ad90294273b3c7280646c35da2d043e0cd633a02d
                                                    • Instruction Fuzzy Hash: 6C218C724093C09FDB128F25CC44A52BFB0EF17320F0984DEE9858F163D265A918DB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.10%

                                                    APIs
                                                    • GetComputerNameW.KERNEL32(?,00000E38,?,?), ref: 007C0142
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID:
                                                    • API String ID: 3545744682-0
                                                    • Opcode ID: d7498e3559270e759e0038d161aebbd93b51429e1e8e3a0f0cf9ad46ace3773d
                                                    • Instruction ID: b1f60ed2e904ae013b0596edbc3bd27ef182cd809512566a550f9595d4e5baba
                                                    • Opcode Fuzzy Hash: d7498e3559270e759e0038d161aebbd93b51429e1e8e3a0f0cf9ad46ace3773d
                                                    • Instruction Fuzzy Hash: 0911B271905340AFD3118B16DC45F76BFB8EFC6620F09819AED489B682D225B919CBB2
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    APIs
                                                    • getsockname.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0EFF
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: getsockname
                                                    • String ID:
                                                    • API String ID: 3358416759-0
                                                    • Opcode ID: 9402f1c53456fef5c427bf1f33c39eb2fba919e057b680b01e6c61538619a416
                                                    • Instruction ID: 2c9c36d0070f6d6822b16df0c99b42e4d99872007c30366fd0c14133ec5ef9fe
                                                    • Opcode Fuzzy Hash: 9402f1c53456fef5c427bf1f33c39eb2fba919e057b680b01e6c61538619a416
                                                    • Instruction Fuzzy Hash: 28119072500204EEEB20CF55CC84F9AF7ACEF55324F04896EE9098B245D774E944CAB1
                                                    Uniqueness

                                                    Uniqueness Score: 1.37%

                                                    APIs
                                                    • DuplicateHandle.KERNEL32(?,?,?,?,?,?,?), ref: 0026A61A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 9665e29e86e4ab4de3834a3e22546c905baa760fa52ba682479475591dd5d263
                                                    • Instruction ID: 976e9cf90e580e95f1734c6dccc472ea627260e5d916139ed10bfe004cfd682c
                                                    • Opcode Fuzzy Hash: 9665e29e86e4ab4de3834a3e22546c905baa760fa52ba682479475591dd5d263
                                                    • Instruction Fuzzy Hash: 76118772409780AFDB228F55DC44A52FFF4EF46310F0884DAFD858B562D275A418DB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    APIs
                                                    • GetLongPathNameW.KERNEL32(?,?,?), ref: 0026BA42
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LongNamePath
                                                    • String ID:
                                                    • API String ID: 82841172-0
                                                    • Opcode ID: c28657c02253a7ff067715e19c84557b5a70b2984bd36845dd48b5724f6ae642
                                                    • Instruction ID: 1249b7fe69f49755e9e7837d0ae94a92f3e5cbcb3c6b13235080badfe4a07c12
                                                    • Opcode Fuzzy Hash: c28657c02253a7ff067715e19c84557b5a70b2984bd36845dd48b5724f6ae642
                                                    • Instruction Fuzzy Hash: 3B218E764093C09FDB23CF64DC55B52BFB4AF47324F0884DAE9848B263D2359948CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.12%

                                                    APIs
                                                    • FindWindowA.USER32(?,00000E38), ref: 007C2D6E
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FindWindow
                                                    • String ID:
                                                    • API String ID: 134000473-0
                                                    • Opcode ID: 119e6e79556878241d6268800deafc9cfd9e6efeaba778aed1ecf9e03a208c4e
                                                    • Instruction ID: e29ef40485de554b52a5e17fb3f4cb7d66e5fd19f6551b783dbe5de410315139
                                                    • Opcode Fuzzy Hash: 119e6e79556878241d6268800deafc9cfd9e6efeaba778aed1ecf9e03a208c4e
                                                    • Instruction Fuzzy Hash: 67110471500200AFEB20CF55CC45FAAFBACDF95324F1488AAFD059A285D275A549CBA1
                                                    Uniqueness

                                                    Uniqueness Score: 1.40%

                                                    APIs
                                                    • RegSetValueExW.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C2814
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID:
                                                    • API String ID: 3702945584-0
                                                    • Opcode ID: 261b31cedfb9f2a2f6c128ca2cc07b8551ffbac057ae6afacd40a1665816f881
                                                    • Instruction ID: 2d7f25ffa8e28a1f97dc82419dca75782dcd3f27e55987e435a22610c6a2c6ca
                                                    • Opcode Fuzzy Hash: 261b31cedfb9f2a2f6c128ca2cc07b8551ffbac057ae6afacd40a1665816f881
                                                    • Instruction Fuzzy Hash: 4F11BF72500600AFEB218F91CC80FABFBECEF55720F04895EEA459A252D775E509CAB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.19%

                                                    APIs
                                                    • ReadFile.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 0026BF31
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileRead
                                                    • String ID:
                                                    • API String ID: 2738559852-0
                                                    • Opcode ID: 78b2399ff360952fe6976754794a5f38a3112c73b758b7f178f047d8d1e029ef
                                                    • Instruction ID: c11fb34411abb80cd9d8a44372047919ad8ec2ed4e52e26906818e2ed419be7a
                                                    • Opcode Fuzzy Hash: 78b2399ff360952fe6976754794a5f38a3112c73b758b7f178f047d8d1e029ef
                                                    • Instruction Fuzzy Hash: 4011E272410200EFEB218F91DC44FAAFBACEF54324F14896AF9048A555D371A594CFB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.02%

                                                    APIs
                                                    • SetFileAttributesW.KERNEL32(?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C31B3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 89f0120a3acd12a57efb7acfca3166a9b400e6745cc6867a0059ec5992c790e4
                                                    • Instruction ID: d12c9d90f79ab6c94af1856c99288e649c72ee565d97fdee73017bdb235cbd84
                                                    • Opcode Fuzzy Hash: 89f0120a3acd12a57efb7acfca3166a9b400e6745cc6867a0059ec5992c790e4
                                                    • Instruction Fuzzy Hash: 2711D3725097845FDB11CF25DC85B52BFE8EF46320F0884AEED45CB252D235D945CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • ShellExecuteExW.SHELL32(?), ref: 007C3354
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ExecuteShell
                                                    • String ID:
                                                    • API String ID: 587946157-0
                                                    • Opcode ID: edffe550bedcf7116f465571e119a2a199320a98ea2769d85c4c12b6660d2875
                                                    • Instruction ID: 2044894ae2e7e95887a5af14faacf96ee8775204e7b326bd2a70030af92cd574
                                                    • Opcode Fuzzy Hash: edffe550bedcf7116f465571e119a2a199320a98ea2769d85c4c12b6660d2875
                                                    • Instruction Fuzzy Hash: FC1133755093809FDB12CF25DC55B56BFA89F46220F0884EEED49CB252D264E948CB62
                                                    Uniqueness

                                                    Uniqueness Score: 2.20%

                                                    APIs
                                                    • ReadProcessMemory.KERNEL32(?,?,?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C36C4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 2b7175b1162bd8be4ad8369909ab06caaf1065ddb82c401a09b011cd2d839d41
                                                    • Instruction ID: debf68f0927c4a31f7b9f28a189b93f6ca8210ad4b6a74890fc16f5bc89cec95
                                                    • Opcode Fuzzy Hash: 2b7175b1162bd8be4ad8369909ab06caaf1065ddb82c401a09b011cd2d839d41
                                                    • Instruction Fuzzy Hash: A311D376009780AFDB228F25DC45A52FFB4EF46320F08809EED858B663C265A958DB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    APIs
                                                    • ioctlsocket.WS2_32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 007C0FDB
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ioctlsocket
                                                    • String ID:
                                                    • API String ID: 3577187118-0
                                                    • Opcode ID: d456e62da82134362599cfd516f776266754edf6cc6eec359f32b2a560370186
                                                    • Instruction ID: dc209e960fb0d8daa098049853660cb961be252e3ee6fbe032ea2144598b6d0d
                                                    • Opcode Fuzzy Hash: d456e62da82134362599cfd516f776266754edf6cc6eec359f32b2a560370186
                                                    • Instruction Fuzzy Hash: 0311C172500244AEEB21CF91CC44FAAFBACEF95324F14886EE9089B245D775A544CAB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.45%

                                                    APIs
                                                    • LoadLibraryA.KERNEL32(?,00000E38), ref: 007C2183
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 67ed5dfaa51b8c47887674f2aaf36d16273f21ae01f6e6b96fab8efd619deaf0
                                                    • Instruction ID: 98017137ac249a2283a2faf5cf91c60b532e9b70cd5ee684d5112d44a3987f4e
                                                    • Opcode Fuzzy Hash: 67ed5dfaa51b8c47887674f2aaf36d16273f21ae01f6e6b96fab8efd619deaf0
                                                    • Instruction Fuzzy Hash: 6F114871110304AFEB20DF11DC85FB6FBACDF95720F18845EFE444A282D7B9A949CAA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.02%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: closesocket
                                                    • String ID:
                                                    • API String ID: 2781271927-0
                                                    • Opcode ID: b1952dbad30d4144d5fe8bcb406e8f4be3a984b24310a63d7d5c80e6c231d353
                                                    • Instruction ID: dad08da2b5912bbd4cea8d997d58d7c08310a9df9ae0f677b29c7d288c38f63b
                                                    • Opcode Fuzzy Hash: b1952dbad30d4144d5fe8bcb406e8f4be3a984b24310a63d7d5c80e6c231d353
                                                    • Instruction Fuzzy Hash: 6B118F71449380AFDB12CF15DC49B52BFB4EF46324F0884DAED498F253D275A958CBA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.45%

                                                    APIs
                                                    • MapViewOfFile.KERNEL32(?,?,?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C1420
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileView
                                                    • String ID:
                                                    • API String ID: 3314676101-0
                                                    • Opcode ID: a0f7462033b68efa6ba07aa91bc2453c5890dbb1814ee17947cdeb76909b6e1a
                                                    • Instruction ID: 9ae5623031b2bf5530c78bf856a610defb6070f635d981aea2f13c59406cde59
                                                    • Opcode Fuzzy Hash: a0f7462033b68efa6ba07aa91bc2453c5890dbb1814ee17947cdeb76909b6e1a
                                                    • Instruction Fuzzy Hash: 9D115E72409780AFDB21CF55DC44B52FFB4EF46320F0884AEED898B662D279A518DB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.53%

                                                    APIs
                                                    • CopyFileW.KERNEL32(?,?,?), ref: 007C30D6
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CopyFile
                                                    • String ID:
                                                    • API String ID: 1304948518-0
                                                    • Opcode ID: ae6a3a71da15bb62c0fd2e822cd7b87b1acf7b5782338ed44ded719eb103ba4b
                                                    • Instruction ID: ff467c62bcfa29f0fb81e51942d2833497309e89f5e88e74ca270d0cc51acc6f
                                                    • Opcode Fuzzy Hash: ae6a3a71da15bb62c0fd2e822cd7b87b1acf7b5782338ed44ded719eb103ba4b
                                                    • Instruction Fuzzy Hash: 701182726002449FDB10CF65D885B56FBE8EF55320F08C46EEC09CB246D635D944CA61
                                                    Uniqueness

                                                    Uniqueness Score: 0.26%

                                                    APIs
                                                    • GetFileType.KERNEL32(?,00000E38,D1E3F35F,00000000,00000000,00000000,00000000), ref: 0026BD95
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileType
                                                    • String ID:
                                                    • API String ID: 3081899298-0
                                                    • Opcode ID: 47867c4806141675b8aaff525ecda4d37eb4d344ab35374b8271978692e47856
                                                    • Instruction ID: fae744a2b97e403da6f683483d3798d459498b0a96968662f7f17f35b59a0139
                                                    • Opcode Fuzzy Hash: 47867c4806141675b8aaff525ecda4d37eb4d344ab35374b8271978692e47856
                                                    • Instruction Fuzzy Hash: E9012231110200EEEB11CF51DC84BAAFBACDF95724F048496ED088F245D7B4E988CAB2
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 2
                                                    • API String ID: 0-450215437
                                                    • Opcode ID: 402eac67ca75b3cf8b56d6bcb509c6e2acccc283c905902b3436605b4cbdfe89
                                                    • Instruction ID: 9d8ef8857c66c68f674c32beaa9469a4d4ea0e60531f0e157dee72a9d5e0e980
                                                    • Opcode Fuzzy Hash: 402eac67ca75b3cf8b56d6bcb509c6e2acccc283c905902b3436605b4cbdfe89
                                                    • Instruction Fuzzy Hash: 80D1C274D45328DFDB14DFA4C558BEEBBB1BF09308F2095A9C009AB291DB795A88CF50
                                                    Uniqueness

                                                    Uniqueness Score: 1.07%

                                                    APIs
                                                    • VirtualAllocEx.KERNEL32(?,?,?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 0026AE54
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 15494a42ce5062b048739ac239bbc0bc38a15fe516c8f5ccca9681758d22600f
                                                    • Instruction ID: 1a09fecd62339023e0a793aefdffb9fc8b6bbccb123c5064e357df83f2393280
                                                    • Opcode Fuzzy Hash: 15494a42ce5062b048739ac239bbc0bc38a15fe516c8f5ccca9681758d22600f
                                                    • Instruction Fuzzy Hash: 1C119E32409780AFDB21CF51DC45E52FFB4EF46320F08849EEA854B662C375A858CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.10%

                                                    APIs
                                                    • GetFileAttributesExW.KERNEL32(?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 0026BBAA
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 49cb4011029fb0998748600df2a8490c90c79aa47c8830949413ff8710c1a17d
                                                    • Instruction ID: 6d03eafcb2e9d9f09942827250414f6632302c38a51b0ab73a55d281f6961d50
                                                    • Opcode Fuzzy Hash: 49cb4011029fb0998748600df2a8490c90c79aa47c8830949413ff8710c1a17d
                                                    • Instruction Fuzzy Hash: 8401D6766103009FDB11CF65D884756FBE8EF55324F0884AAED09CB216D771D494CB61
                                                    Uniqueness

                                                    Uniqueness Score: 6.12%

                                                    APIs
                                                    • SetFileAttributesW.KERNEL32(?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C31B3
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: fb152e58e9f5c4f2a79b3d7cda451d859ea5bffd384a48233c00c257031c0f17
                                                    • Instruction ID: 42aadd46ededf491faa83ec19063f13d8ce0d4007adfc47c9bf8f0173cfb9270
                                                    • Opcode Fuzzy Hash: fb152e58e9f5c4f2a79b3d7cda451d859ea5bffd384a48233c00c257031c0f17
                                                    • Instruction Fuzzy Hash: 550192726006449FEB10CF6AD885B56FBD8EF55321F0CC4AEED09CB256D279D904CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • CreateFileMappingW.KERNELBASE(?,00000E38,?,?), ref: 007C138A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateFileMapping
                                                    • String ID:
                                                    • API String ID: 524692379-0
                                                    • Opcode ID: 57c568ee6dc64de3e4fd5200e30e1f2f196e59217f31f73848e40a49c9d4154e
                                                    • Instruction ID: 2a216e5344e4cefcd288f2d1cdd836367a7e7b5660ac27aff0ea80af3c73525b
                                                    • Opcode Fuzzy Hash: 57c568ee6dc64de3e4fd5200e30e1f2f196e59217f31f73848e40a49c9d4154e
                                                    • Instruction Fuzzy Hash: F501B172900200AFD310DF16DC45B66FBA8FF88B20F14856AED088B741D331F515CAE2
                                                    Uniqueness

                                                    Uniqueness Score: 3.53%

                                                    APIs
                                                    • WriteProcessMemory.KERNEL32(?,?,?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C3780
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: 29af05e8fd5fb3425aeef04dd23ab85f35293d4bc2c9caa0a9b2e264a5be4365
                                                    • Instruction ID: cbf8f54c9a8845a5f6e72d3c5cb858b4b61e3a156de4fdb67002c3bbed63fe84
                                                    • Opcode Fuzzy Hash: 29af05e8fd5fb3425aeef04dd23ab85f35293d4bc2c9caa0a9b2e264a5be4365
                                                    • Instruction Fuzzy Hash: 7F01A1B51006009FEB208F15D884F62FBA4EF55320F08C4AEED458B622D335E958DF62
                                                    Uniqueness

                                                    Uniqueness Score: 0.04%

                                                    APIs
                                                    • ShellExecuteExW.SHELL32(?), ref: 007C3354
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ExecuteShell
                                                    • String ID:
                                                    • API String ID: 587946157-0
                                                    • Opcode ID: 188ef5a02fc044355cfb7fd90973a44e717bfadbb5db19edfe27bbb85d9f9cc3
                                                    • Instruction ID: 85ba866db54d93ed889aa4a7d838e6fc05444563521ea01c5fc3ea63122ac02c
                                                    • Opcode Fuzzy Hash: 188ef5a02fc044355cfb7fd90973a44e717bfadbb5db19edfe27bbb85d9f9cc3
                                                    • Instruction Fuzzy Hash: 900192716002809FEB10CF66D985B56FBD8EF45720F08C4AEEC09CB246D779E904CB61
                                                    Uniqueness

                                                    Uniqueness Score: 2.20%

                                                    APIs
                                                    • DeleteFileW.KERNEL32(?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C3530
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DeleteFile
                                                    • String ID:
                                                    • API String ID: 4033686569-0
                                                    • Opcode ID: 94a906d5e0ed80ef15cce960ad3b5ab8721060f6f593a5a40a3b9a7928f88452
                                                    • Instruction ID: c03c3af1b6c910d514b45a14d94851c99c8066d1815e4caf84ad72bea6df58fb
                                                    • Opcode Fuzzy Hash: 94a906d5e0ed80ef15cce960ad3b5ab8721060f6f593a5a40a3b9a7928f88452
                                                    • Instruction Fuzzy Hash: 6801B5726002409FDB10CF6AE885B56FBD8DF41720F08C4AEEC09CB346D779D914CA61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • CreatePipe.KERNEL32(?,00000E38,?,?), ref: 007C2916
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreatePipe
                                                    • String ID:
                                                    • API String ID: 2719314638-0
                                                    • Opcode ID: e05641c432603c5d969d90fa16e4afb2c5cc440004540f5e94d7977ecc26d7ce
                                                    • Instruction ID: 76881d41137578dc9f83805eaae1f7938310f030aecaff7de8eead4362a4bf97
                                                    • Opcode Fuzzy Hash: e05641c432603c5d969d90fa16e4afb2c5cc440004540f5e94d7977ecc26d7ce
                                                    • Instruction Fuzzy Hash: 9D019E72900200AFD310DF16DC45B66FBA8FB88A20F14856AED088B741D231F515CAE2
                                                    Uniqueness

                                                    Uniqueness Score: 0.77%

                                                    APIs
                                                    • LoadLibraryShim.MSCOREE(?,?,?,?), ref: 007C16F1
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoadShim
                                                    • String ID:
                                                    • API String ID: 1475914169-0
                                                    • Opcode ID: 4439312ceb4f42ce2f68e6a30166f67b0d1dc6dbacd59c9ec32d6f0f43959aec
                                                    • Instruction ID: 950c1f4d832ad57e558d7634ec9536fde4b81e0491e4c731a553fe4f5da2b9bb
                                                    • Opcode Fuzzy Hash: 4439312ceb4f42ce2f68e6a30166f67b0d1dc6dbacd59c9ec32d6f0f43959aec
                                                    • Instruction Fuzzy Hash: BF0192755003009FDB20CF56D985B12FBE8EF56720F08C46EED498B252D775E818CE62
                                                    Uniqueness

                                                    Uniqueness Score: 0.65%

                                                    APIs
                                                    • DuplicateHandle.KERNEL32(?,?,?,?,?,?,?), ref: 0026A61A
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 28b1abd980ac92a2af188d94e119a6fd22bb0613ec8404bfeb65347b70e4bc12
                                                    • Instruction ID: 35cbae8c841aff50cde2d5db54b35f37e3bf570f4d46ba02e7b2cfe4f6af450b
                                                    • Opcode Fuzzy Hash: 28b1abd980ac92a2af188d94e119a6fd22bb0613ec8404bfeb65347b70e4bc12
                                                    • Instruction Fuzzy Hash: 28018B32410700AFDF218F95D844B52FBE4EF59320F08C9AAEE494A616C372A468DF62
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Atom
                                                    • String ID:
                                                    • API String ID: 2154973765-0
                                                    • Opcode ID: 4e7182c1fd4ff26a7147bd7c0456f5918a6b42f212c0049c44795019a643dc86
                                                    • Instruction ID: 80433e45f4748625b309000d67d525fb10792adf61c6a9c0344b509136d1a5ef
                                                    • Opcode Fuzzy Hash: 4e7182c1fd4ff26a7147bd7c0456f5918a6b42f212c0049c44795019a643dc86
                                                    • Instruction Fuzzy Hash: 2C01D4715002409FDB10CF56D884B66FBE8DF46720F4CC4BEEC489B206DB79E404CAA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.38%

                                                    APIs
                                                    • SetThreadContext.KERNEL32(?,?), ref: 007C3617
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ContextThread
                                                    • String ID:
                                                    • API String ID: 1591575202-0
                                                    • Opcode ID: 76e863da36585ec5b9bb25cc5e024e3cd173f7610837c677fd11fc7da3c4c317
                                                    • Instruction ID: 9b119d2ff7d9ebcfee14071929c7d2bf89f4f3bf8e617a1f50d97c3018c7127e
                                                    • Opcode Fuzzy Hash: 76e863da36585ec5b9bb25cc5e024e3cd173f7610837c677fd11fc7da3c4c317
                                                    • Instruction Fuzzy Hash: 9601B135600200AFEB10CF16D885B65FBA4EF45720F08C0AEDC098B352D379EA58CAA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.60%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,?,?), ref: 0026B802
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 6c76d17d041b20e4b644571bc0e523b8f3c40cea999e4fce87a04c4e6d79ef44
                                                    • Instruction ID: 35bdef8c9a155a6705461f4ca19d8d8bd09832c7e37e9098c70d52df519c2194
                                                    • Opcode Fuzzy Hash: 6c76d17d041b20e4b644571bc0e523b8f3c40cea999e4fce87a04c4e6d79ef44
                                                    • Instruction Fuzzy Hash: 6A01A271900600ABD310DF16DC46B66FBA8FFC9B20F14815AED084B741D371F565CAE6
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • setsockopt.WS2_32(?,?,?,?,?), ref: 0026B990
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: setsockopt
                                                    • String ID:
                                                    • API String ID: 3981526788-0
                                                    • Opcode ID: 4881c60e08dc9fe4f479161fb03e331b762b94b39667975393e7e096e8e25ccc
                                                    • Instruction ID: 5a8d36fb2754abed95c66bedcaa3e955178c38d24b7537618689d46c8356053c
                                                    • Opcode Fuzzy Hash: 4881c60e08dc9fe4f479161fb03e331b762b94b39667975393e7e096e8e25ccc
                                                    • Instruction Fuzzy Hash: F401B532511340DFDF21CF95D844B55FBA4EF55321F0888AAEE498B216D371E4A8CF62
                                                    Uniqueness

                                                    Uniqueness Score: 0.42%

                                                    APIs
                                                    • GetComputerNameW.KERNEL32(?,00000E38,?,?), ref: 007C0142
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ComputerName
                                                    • String ID:
                                                    • API String ID: 3545744682-0
                                                    • Opcode ID: 88a2dfdbd0535dcdfe2d428623571bc8e511932c7bd9d72f46f655b4b8bcaf89
                                                    • Instruction ID: fe82c1db3e392f0404e40a900141373013d8540c5e8098b31d928107baa49d11
                                                    • Opcode Fuzzy Hash: 88a2dfdbd0535dcdfe2d428623571bc8e511932c7bd9d72f46f655b4b8bcaf89
                                                    • Instruction Fuzzy Hash: 2D01A271900600ABD310DF16DC46B66FBA8FFC9B20F148159ED084B741D331F555CAE6
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    APIs
                                                    • MapViewOfFile.KERNEL32(?,?,?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C1420
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileView
                                                    • String ID:
                                                    • API String ID: 3314676101-0
                                                    • Opcode ID: bfc22e765c3b7c4d140b360875e2b6031492c2184fe956c2bf635db2c08b9e76
                                                    • Instruction ID: fe1cace784812db02faae3f6b6b20e5f90515fedca64c8f1b314b90541464c81
                                                    • Opcode Fuzzy Hash: bfc22e765c3b7c4d140b360875e2b6031492c2184fe956c2bf635db2c08b9e76
                                                    • Instruction Fuzzy Hash: CB0192324007409FDF20CF55D884B51FBA4EF45320F1888BEED494B616D375A518DB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.53%

                                                    APIs
                                                    • ReadProcessMemory.KERNEL32(?,?,?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 007C36C4
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 5f4c5af087b7dc9269a2b919a89915279ea9b300f10e6ca8b29568cb28a7a76f
                                                    • Instruction ID: 0df5b04e403d665ef5eb05fd8c3bfad1ec8ec59687555728d2aa669e1dccbe27
                                                    • Opcode Fuzzy Hash: 5f4c5af087b7dc9269a2b919a89915279ea9b300f10e6ca8b29568cb28a7a76f
                                                    • Instruction Fuzzy Hash: FF01F532100700AFDB208F55D845B52FBA0EF15320F08C46EED464B721C375E518DF62
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    APIs
                                                    • GetLongPathNameW.KERNEL32(?,?,?), ref: 0026BA42
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LongNamePath
                                                    • String ID:
                                                    • API String ID: 82841172-0
                                                    • Opcode ID: 650330ef625a5ffb3b07d5d729591691c6e8b3715e0bfe5f7029c6f20b496753
                                                    • Instruction ID: d513942471fc81d93128e952c7d1034a238235f4c067bc9183292331c9950a67
                                                    • Opcode Fuzzy Hash: 650330ef625a5ffb3b07d5d729591691c6e8b3715e0bfe5f7029c6f20b496753
                                                    • Instruction Fuzzy Hash: 3801D472414340DFDF11CF95D884B55FBA4EF55320F08C4AAED488B216D371A994CBA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.12%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: closesocket
                                                    • String ID:
                                                    • API String ID: 2781271927-0
                                                    • Opcode ID: 84ad777cb3c541f518e8b254bae044426d115fccc5cc91138af02f8a39cbaf04
                                                    • Instruction ID: 57d239a448b57e5d9754492fdbb6372f93f3979adbfeb6e95c5ebf2f27376f5f
                                                    • Opcode Fuzzy Hash: 84ad777cb3c541f518e8b254bae044426d115fccc5cc91138af02f8a39cbaf04
                                                    • Instruction Fuzzy Hash: 3C01D1715213409FDF10CF55D888762FBA4EF45320F18C4AAED089B216D375A998CFA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.45%

                                                    APIs
                                                    • VirtualAllocEx.KERNEL32(?,?,?,?,?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 0026AE54
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 59a8a8bb50ee9ae945ed65f6a3d830194a6c9161e383d342a578247d823dbd03
                                                    • Instruction ID: 6dab6f5f95734a1ce3ceb22ea4c64bf27aaea43accfd270d6c750e507490cea8
                                                    • Opcode Fuzzy Hash: 59a8a8bb50ee9ae945ed65f6a3d830194a6c9161e383d342a578247d823dbd03
                                                    • Instruction Fuzzy Hash: B1018431410740DFDB208F55D885B51FBA4EF55320F0884AADD490B626D372E468DF62
                                                    Uniqueness

                                                    Uniqueness Score: 0.10%

                                                    APIs
                                                    • PostMessageW.USER32(?,?,?,?), ref: 007C38D5
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318499229.007C0000.00000040.00000001.sdmp, Offset: 007C0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7c0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: MessagePost
                                                    • String ID:
                                                    • API String ID: 410705778-0
                                                    • Opcode ID: 470167171f905fb058970441a5cb4d6430b9ca1cdedccf5979b347d16692e225
                                                    • Instruction ID: c3b75ac3b5a36af45df77ce39d7a5fcb816c38f82ee833d9acc993a0b7bcf551
                                                    • Opcode Fuzzy Hash: 470167171f905fb058970441a5cb4d6430b9ca1cdedccf5979b347d16692e225
                                                    • Instruction Fuzzy Hash: 76018B365007449FEB208F46D885B61FBA0EF59320F08C59EED494B226D37AE558DFA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.10%

                                                    APIs
                                                    • ResumeThread.KERNEL32(?,D1E3F35F,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 0026A6CC
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: e1ad7c5093a82689bc394261153c4f3e6bd48cee913b4cca5f3a10b360d71068
                                                    • Instruction ID: 0c3c6d19cf129b30cc88329a36dc3a814cdce6bdc91d497b53c439cb1dd7002c
                                                    • Opcode Fuzzy Hash: e1ad7c5093a82689bc394261153c4f3e6bd48cee913b4cca5f3a10b360d71068
                                                    • Instruction Fuzzy Hash: 80F0FF354203409FDF108F06D884761FBA8EF41320F0CC0AADD090B216D3B5E8A8CEA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :@}l
                                                    • API String ID: 0-282943697
                                                    • Opcode ID: 60604a21ce57bbf09daf7f9e4e6e5935b526de22ece4ddddc65fd77d6fa18195
                                                    • Instruction ID: e4b54af40029979263d3927ccf84fa93af06e2876beb7b2447090587d798d4b7
                                                    • Opcode Fuzzy Hash: 60604a21ce57bbf09daf7f9e4e6e5935b526de22ece4ddddc65fd77d6fa18195
                                                    • Instruction Fuzzy Hash: 8F91CBB4D00218DFCB18DFA5C944AEDBBB2BF59304F209569D40ABB354DB399A85CF50
                                                    Uniqueness

                                                    Uniqueness Score: 7.75%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :@}l
                                                    • API String ID: 0-282943697
                                                    • Opcode ID: 74d58b3636c33ce36f2cf565bf6e1ae9771a42afc1f29dd46c6def41561372bd
                                                    • Instruction ID: bcb488cc550cef7aa8e8cd0d12525bdac6af6b2864ae3b02e354603d300a3cf9
                                                    • Opcode Fuzzy Hash: 74d58b3636c33ce36f2cf565bf6e1ae9771a42afc1f29dd46c6def41561372bd
                                                    • Instruction Fuzzy Hash: 71410374E01208AFCF08DFA4D594AEEBBB2FF89304F208869E815A7395DB359941CF51
                                                    Uniqueness

                                                    Uniqueness Score: 7.75%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: 7f0005ee2641417ec1ece4ab80ce30cabf3d9605a06f4c7830e31f43e35a270c
                                                    • Instruction ID: aee81ddf8b3d0d9e5af89d4f83d07c1c4f0b43b0699ee52fd5870da633bfe109
                                                    • Opcode Fuzzy Hash: 7f0005ee2641417ec1ece4ab80ce30cabf3d9605a06f4c7830e31f43e35a270c
                                                    • Instruction Fuzzy Hash: BA11C672509380AFDB11CF25DC84B52BFA8EF42320F0880EAFD459B652D274A858CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317539580.0026A000.00000040.00000001.sdmp, Offset: 0026A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_26a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: 0596ab6d2aedbc3cb0c96985ec63dba5c18420658fa463c08f0829f98b37a9d7
                                                    • Instruction ID: 83f6e3287c9c67c1fa473761f123b905f9836a0dcd0a279d444828810ccd57d3
                                                    • Opcode Fuzzy Hash: 0596ab6d2aedbc3cb0c96985ec63dba5c18420658fa463c08f0829f98b37a9d7
                                                    • Instruction Fuzzy Hash: 9701DF726103409FDB108F59D884766FBA4EF41320F08C4EAEC098B316D375E868CEA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: |x(
                                                    • API String ID: 0-1895371554
                                                    • Opcode ID: 12f377c7443a44410f9c4a85291d14692107958963a6129027046e70af965296
                                                    • Instruction ID: d7aa460af1d9ed58e7c19e0642e4777d1b2382bcde8e05fab3ee727291953199
                                                    • Opcode Fuzzy Hash: 12f377c7443a44410f9c4a85291d14692107958963a6129027046e70af965296
                                                    • Instruction Fuzzy Hash: 02016D78946248DFCB01EBA8D54499DBBB4FF06304F1445D5D8849B352D330EE59DFA1
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5d2a880604291cec5ad178375791034ba186b9af64678bf15d79316f9e82449b
                                                    • Instruction ID: 13fb62f8d4d5acdc72c23909216c34e42408f87a98fcca3a4d3a4d45caef121f
                                                    • Opcode Fuzzy Hash: 5d2a880604291cec5ad178375791034ba186b9af64678bf15d79316f9e82449b
                                                    • Instruction Fuzzy Hash: F762E174D81228CFDB24DF61D948BEDBBB2BB49308F6044A9C909A7390DB795E85CF50
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 511fddc3c9288d703c3c93e09fa08a2bc573a0b3707192455108819b0759c247
                                                    • Instruction ID: 77521c28e92a0d57111799d3c234558b2a8f4337eb82f0c0be99aad697c3bb81
                                                    • Opcode Fuzzy Hash: 511fddc3c9288d703c3c93e09fa08a2bc573a0b3707192455108819b0759c247
                                                    • Instruction Fuzzy Hash: 86C13830C4521ACFCB20EFA8C844BEDBBB5BF16304F2085AAD51967291DBB95A85DF41
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f4d81a2901174b7ab95c690bc05dab54af30fa936e744f8fdb33e70b7b3bddcc
                                                    • Instruction ID: a9426d0a0c383db88a71d20e8fcc9bf578cb30ef70ef05e8edb171d234bf0deb
                                                    • Opcode Fuzzy Hash: f4d81a2901174b7ab95c690bc05dab54af30fa936e744f8fdb33e70b7b3bddcc
                                                    • Instruction Fuzzy Hash: BEB11430C4422ACFCF20DFA8C884BEDBBB5BF16314F2085AAD51967291DBB55A85DF41
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3226371816cce469070df718be417459e86b46d4285e8cfd3506f72fb40d14fc
                                                    • Instruction ID: 503e03a5219c061328d56f08f9bca3c201b3486caab1599246a927129751df34
                                                    • Opcode Fuzzy Hash: 3226371816cce469070df718be417459e86b46d4285e8cfd3506f72fb40d14fc
                                                    • Instruction Fuzzy Hash: 9D911234E41218DBEB14DFA5D891BEEB7B2AF89704F208429E9017F394CB71A845CF55
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a72ea4fba65f0a6d99f730cb9c69605b6e13d4140856279c313e648810d62426
                                                    • Instruction ID: 217adccf4d7701bb9adf9e9f8b91ae283d5df5cbd7a76a06f9208c89bd7ab571
                                                    • Opcode Fuzzy Hash: a72ea4fba65f0a6d99f730cb9c69605b6e13d4140856279c313e648810d62426
                                                    • Instruction Fuzzy Hash: 42813474C42219CFCB04DFA5E8587EEBBB1FB4A305F54946AD401B72A0DB784A88CF54
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 572597b050dc71757a7d1309836434bfe40e4316ebfe99a07f4ce7d9d9cb8870
                                                    • Instruction ID: 9b75b9ff813bf241e7084c6f87276ff0964cb0d9157b4794ed09165f5600c10a
                                                    • Opcode Fuzzy Hash: 572597b050dc71757a7d1309836434bfe40e4316ebfe99a07f4ce7d9d9cb8870
                                                    • Instruction Fuzzy Hash: 53611F74E44248CFCB18DFA9D894AADBBF2BF89304F20856AD405AB364DB359842CF40
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 82e8e499076c14a4ef3b18ab9af630c46bbf68dec975cedcd39a5047220d89d2
                                                    • Instruction ID: 44c5fa89b8fd5ad41c13d3152e4e65fa567e804eb71c0227f618aa75af83fcdd
                                                    • Opcode Fuzzy Hash: 82e8e499076c14a4ef3b18ab9af630c46bbf68dec975cedcd39a5047220d89d2
                                                    • Instruction Fuzzy Hash: F1516C74D90106CFCB00EFE9E94898CBBF9FB44319B918969D0249B265DB30DC92CF99
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 883407e8906546f67e835738ff3880e7136fd0edd089cd69e28864f42f1746a9
                                                    • Instruction ID: f3cf0000ca9686436f953ac996b372f355d4e2831157f479e1f37ab121d1a58a
                                                    • Opcode Fuzzy Hash: 883407e8906546f67e835738ff3880e7136fd0edd089cd69e28864f42f1746a9
                                                    • Instruction Fuzzy Hash: 03515C74D90106CFCB00EFE9E94498CBBF9FB44319B918969D0249B265DB30DC91CF99
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c2702469bbe2983ec2ac4dd92471da3d91fcce9c0ca0ae6f61d7a0a8deae2e3e
                                                    • Instruction ID: fef7db7ff2ed218c9cbe3fed662c7cd47f04e047b00420143c87f4b8a91380c6
                                                    • Opcode Fuzzy Hash: c2702469bbe2983ec2ac4dd92471da3d91fcce9c0ca0ae6f61d7a0a8deae2e3e
                                                    • Instruction Fuzzy Hash: 22411870D01228CFCB29DFA1C9547DDB7B2AF96308F6048A8C1096B390CBB65AC5CF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 28f8eddd0d36266116a8fbfa4e857b93714e7ae16d3e92c10c358e5db64260a4
                                                    • Instruction ID: 931aa5fe794b2302e571114be4cac2933fb262ad46ccd1a2a7191d372fff0fe3
                                                    • Opcode Fuzzy Hash: 28f8eddd0d36266116a8fbfa4e857b93714e7ae16d3e92c10c358e5db64260a4
                                                    • Instruction Fuzzy Hash: 12319C70D0510A9FCF00EFE9C440AAEBBF6BF8A324F24C655D114A7295DB749A419B61
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317566032.00282000.00000040.00000001.sdmp, Offset: 00282000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_282000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 593665ad94824b0ca776a78336190a3f72c6023eaa318526aaf12282b7c20bef
                                                    • Instruction ID: d40ed98f1ec05ef4863937691e6c574033cde5238389abc5183cc0eed7a9938c
                                                    • Opcode Fuzzy Hash: 593665ad94824b0ca776a78336190a3f72c6023eaa318526aaf12282b7c20bef
                                                    • Instruction Fuzzy Hash: 51315CB6509340AFD750CF06EC45A57FFE8EB89620F08C85EF94997252D275A908CBA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 12fd85997b1c23fe50a835447ab353094c45b1067f9a200a57552aeaaa5fff4a
                                                    • Instruction ID: c3ec17dc1fe510e6f1f105cccba310908ba4b2670649ffe165f3784e89a1a2e3
                                                    • Opcode Fuzzy Hash: 12fd85997b1c23fe50a835447ab353094c45b1067f9a200a57552aeaaa5fff4a
                                                    • Instruction Fuzzy Hash: F5310370D42208EFDB14DFA5D484BEEBBB2BF49348F609429E501B7290CB799985CF94
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317566032.00282000.00000040.00000001.sdmp, Offset: 00282000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_282000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 04dfb533f0b883ee210b6d82525fb31cb728fd35995b6fbe10b53b6310a6f455
                                                    • Instruction ID: e84ff37a01377f6822bb9aa497d30a8ba65680192c506ab518463b72a0793145
                                                    • Opcode Fuzzy Hash: 04dfb533f0b883ee210b6d82525fb31cb728fd35995b6fbe10b53b6310a6f455
                                                    • Instruction Fuzzy Hash: 5E215EB6508340AFD750CF46EC41A57FBE8EBC9620F04C86EF94997312D271E904CBA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c60f37089d52fc92952fd74dad00b8f5c8babb3ec43092a6e0b9b7ef9ceafed7
                                                    • Instruction ID: 7f81b6d78085e813b373e9d560818a164ec618d062b36c748787ca1a54910ec8
                                                    • Opcode Fuzzy Hash: c60f37089d52fc92952fd74dad00b8f5c8babb3ec43092a6e0b9b7ef9ceafed7
                                                    • Instruction Fuzzy Hash: 4931E7B4E012099FCB04DFA9D854A9EFBF2FF89300F248069D815A7361DB359945CF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317566032.00282000.00000040.00000001.sdmp, Offset: 00282000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_282000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b34517c40cd1677454f9fe49646bf4f3181c655cd28fa732ff636e2bfe8ea5f1
                                                    • Instruction ID: b4cdd6c8a94d9348d421f2e3ef354703e2a9da21006cc6860e641e1d879d2e05
                                                    • Opcode Fuzzy Hash: b34517c40cd1677454f9fe49646bf4f3181c655cd28fa732ff636e2bfe8ea5f1
                                                    • Instruction Fuzzy Hash: A12119B6508300AFD650CF4AEC41A56FBE8EBC8660F14C82EFD4897311D275E9148BA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317566032.00282000.00000040.00000001.sdmp, Offset: 00282000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_282000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 225725e4634f29001173e44b1f1cf5ee28b50778107a43955083c1f7144182ed
                                                    • Instruction ID: fc535671f7be4882f366e1fd51e11954ede16961695bbdc8c008250b0f2384c2
                                                    • Opcode Fuzzy Hash: 225725e4634f29001173e44b1f1cf5ee28b50778107a43955083c1f7144182ed
                                                    • Instruction Fuzzy Hash: 792119B6508300AFD650CF0AEC41A56FBE8EBC8660F14C82EFD4897311D275E9148BA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ee7fafcabd68983f4c29e90553c99bed2b4a9035da33b1870f93627400175ee9
                                                    • Instruction ID: 271494bac83a73c03920fed303c3aa9d2d6bed333e59b59f7c26e7f53c0a214a
                                                    • Opcode Fuzzy Hash: ee7fafcabd68983f4c29e90553c99bed2b4a9035da33b1870f93627400175ee9
                                                    • Instruction Fuzzy Hash: D2218074D4D3889FCB06DFA5D8093ACBFB4AF06310F2480DAC405A7292D3384A48DFA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317566032.00282000.00000040.00000001.sdmp, Offset: 00282000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_282000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5830ce5daf10ebece6e81baeda98a06cecd05a4b2fd677205d5b6038b5912c3d
                                                    • Instruction ID: 5a524c6507871a7e7c852c5bb9190f3d3295f40b070c4c2229170b87ba7ff204
                                                    • Opcode Fuzzy Hash: 5830ce5daf10ebece6e81baeda98a06cecd05a4b2fd677205d5b6038b5912c3d
                                                    • Instruction Fuzzy Hash: 2A112977515340AFD7118F12AC05A52FFA8DB92631F08C4ABEE088B653D176B518CBB2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b04d1879d5940918080320c3d14fc88fa718a601aa5150d9f7eb024844ffcb82
                                                    • Instruction ID: 0b95f56d204563661e050f8c612af7a70fe4904cbc27f64479a727e8a9720737
                                                    • Opcode Fuzzy Hash: b04d1879d5940918080320c3d14fc88fa718a601aa5150d9f7eb024844ffcb82
                                                    • Instruction Fuzzy Hash: B8217C34986244CFC716DFA1E84C6A97BB2FB4A301F6489A5EE0583391CB3059A6CF61
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de34373d0c3ff66d3a983070e04ea374c421c7e391c0223615851314888aaa67
                                                    • Instruction ID: 9aec69e33e6ae640dac8521a695d9a7078f45cc5b760f15943d3ee1609fd5130
                                                    • Opcode Fuzzy Hash: de34373d0c3ff66d3a983070e04ea374c421c7e391c0223615851314888aaa67
                                                    • Instruction Fuzzy Hash: F6213770D42208EFDB14DFA5D498BEEBBB2BF49308F209029E505B7390C7B59945CB94
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.320361861.00F60000.00000040.00000001.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_f60000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b9f81f2d51abd8cc0a0db254908b40c6a275932863ab2f86ec643c8dbe9b1d57
                                                    • Instruction ID: 4d7dfb9d4887226b870b9e5a3bf4361a57835fe43fe78d26345afe457249b6c9
                                                    • Opcode Fuzzy Hash: b9f81f2d51abd8cc0a0db254908b40c6a275932863ab2f86ec643c8dbe9b1d57
                                                    • Instruction Fuzzy Hash: DA11B8B5508301AFD340CF19D880A5BFBE4FBC8664F04896EF99897311D231E914CFA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318526362.007E0000.00000040.00000040.sdmp, Offset: 007E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7e0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5b3e7c7a8f4accce31b6fb02249390d409533fb1fd6007e628735ac7f7aa18ea
                                                    • Instruction ID: 9ed7f0c5478a21352dd58751549bee382d421ed4cde8df2b01463b0b14bb0821
                                                    • Opcode Fuzzy Hash: 5b3e7c7a8f4accce31b6fb02249390d409533fb1fd6007e628735ac7f7aa18ea
                                                    • Instruction Fuzzy Hash: E411E4311093C49FD711CB55D980F16BB95EB99708F28C9ADE4491B243C7BBDC83DA91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 144d906e39a4606423eed6ee84175dd7f85b77c66c659091db3e90eee7942438
                                                    • Instruction ID: 07035226febf1c67eb51a837156471387eaf93e0636aba632f1f10f68dccd0c5
                                                    • Opcode Fuzzy Hash: 144d906e39a4606423eed6ee84175dd7f85b77c66c659091db3e90eee7942438
                                                    • Instruction Fuzzy Hash: 592144B0C45248DFDB04DFE6C5083EDFBB1AF45304F1080AAC814AB295E7791A4ACF80
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317566032.00282000.00000040.00000001.sdmp, Offset: 00282000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_282000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8223e61ecd928a1bfc91b51bb0d19a77dfd43c23e355cdc20e1521820d7cd385
                                                    • Instruction ID: d69d0a8bfaec21441a350c60e0f5c486328ab080484707feed0db44cc1832a34
                                                    • Opcode Fuzzy Hash: 8223e61ecd928a1bfc91b51bb0d19a77dfd43c23e355cdc20e1521820d7cd385
                                                    • Instruction Fuzzy Hash: 8311BAB5508301AFD750CF5ADC41A5BFBE8EBC8660F04892EF95997311D271E918CFA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.320361861.00F60000.00000040.00000001.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_f60000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 22a548c76d080c306260ba2e0702b2e1bcc64e309255d41c8bc7dc67091f2b20
                                                    • Instruction ID: 41242090618b6816dcb4ec407030dfccc776bf6b672b51d150ba1942d0c10a0e
                                                    • Opcode Fuzzy Hash: 22a548c76d080c306260ba2e0702b2e1bcc64e309255d41c8bc7dc67091f2b20
                                                    • Instruction Fuzzy Hash: 4A11FAB5508301AFD350CF09DC84A5BFBE8EBC8660F04882EF95897311D271E908CFA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318526362.007E0000.00000040.00000040.sdmp, Offset: 007E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7e0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 561b4864b55a8f3e8d788d23509bf767ed08100d42648331c5bd0cf8de04c8b3
                                                    • Instruction ID: bc7920d0d2a2178044ee958ec0466475ebdb90d127aee17ecccf7bbf0bed19b7
                                                    • Opcode Fuzzy Hash: 561b4864b55a8f3e8d788d23509bf767ed08100d42648331c5bd0cf8de04c8b3
                                                    • Instruction Fuzzy Hash: B0F0D6775097806FC7118F16AC40862FFB8DE8663070DC4AFFC498B656D225A904CBB2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c63a08ea48cf826bfc0e1a44ba101cff8fb374808aff623c0e2e64af1eee57cc
                                                    • Instruction ID: bf07a4bdb55c9997cc9b555c3c2befe9ebf8ce4b99fbaf444230f7de4f96db5f
                                                    • Opcode Fuzzy Hash: c63a08ea48cf826bfc0e1a44ba101cff8fb374808aff623c0e2e64af1eee57cc
                                                    • Instruction Fuzzy Hash: D9F02B34A46248DFD706D7B1D664BAE7B76EFC7208F15A4D5800423282CA355F02D354
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3bb311ecc2ed0b4513b76ec7bef88470f9036551c3838a4e643a7b9d11c8b12c
                                                    • Instruction ID: e556c85b15b27aa4d8e0bb4ed02d0f15e8d6e0af7ad835edccd28c974941a6ae
                                                    • Opcode Fuzzy Hash: 3bb311ecc2ed0b4513b76ec7bef88470f9036551c3838a4e643a7b9d11c8b12c
                                                    • Instruction Fuzzy Hash: F7F03038A52108DBD708DBB1E668BBE77A6EFC6248F50A4688405332849F755E02D755
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318526362.007E0000.00000040.00000040.sdmp, Offset: 007E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7e0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 46debe57896ac666fbdd8b357651a768cc350afad20f7cf280d2b96e708a9c95
                                                    • Instruction ID: 249801178906d014454e6642db3bb34e9469f8fdb2e6d5108ff3c5d7c76ac4dc
                                                    • Opcode Fuzzy Hash: 46debe57896ac666fbdd8b357651a768cc350afad20f7cf280d2b96e708a9c95
                                                    • Instruction Fuzzy Hash: 7FF03C35108684DFC306CF54D940B15FBA2FB89718F24C6ADE9491B762C77BE853DA81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fd44ba6d9bbc14876209bb9b0ef7258917eadbd94ae9ab6a492214f26113cb2b
                                                    • Instruction ID: 2a4394dff324413d95d612c27d3ae77f5186224c650b11086594bbd33c95f2d9
                                                    • Opcode Fuzzy Hash: fd44ba6d9bbc14876209bb9b0ef7258917eadbd94ae9ab6a492214f26113cb2b
                                                    • Instruction Fuzzy Hash: 5DF08C3894A348DFCB06DBB5E409198BFB5BF42305F2040EAD8488B352D3715A49DBA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 78ee5d5d56d736a25f42cbf994a12e82ef1e5ea1b0709a3c40064ec802a5a0f0
                                                    • Instruction ID: 250074078a4bd84b76da17369003034a52781680fc141e06f42d53302004193f
                                                    • Opcode Fuzzy Hash: 78ee5d5d56d736a25f42cbf994a12e82ef1e5ea1b0709a3c40064ec802a5a0f0
                                                    • Instruction Fuzzy Hash: F0F05238D42208DFCB04EFB4E5485ADBBB0FF46304F2089AAD814A3351DB319A02CB80
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318526362.007E0000.00000040.00000040.sdmp, Offset: 007E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_7e0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 422376033bb0386137f31aa8e590a64c86adb983733340451e362f70b9ef42c1
                                                    • Instruction ID: 818725bfb816ee341803d3717e7b4f221f9154b2c5545be188044b470b707e7d
                                                    • Opcode Fuzzy Hash: 422376033bb0386137f31aa8e590a64c86adb983733340451e362f70b9ef42c1
                                                    • Instruction Fuzzy Hash: 7EE092766007009F9650CF0BEC41452F7A8EBC4631B18C47FEC0D8B715E635B504CAA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317566032.00282000.00000040.00000001.sdmp, Offset: 00282000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_282000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ad29cffa2f9f140699a71b60be3e344c802b533e55474c84eec7106f5531f3f6
                                                    • Instruction ID: 7143a615a909abcbf0c1ff2240790ce0750330b531c67da820f927048e021680
                                                    • Opcode Fuzzy Hash: ad29cffa2f9f140699a71b60be3e344c802b533e55474c84eec7106f5531f3f6
                                                    • Instruction Fuzzy Hash: 65E0D8725403046BD2508E079C45B53FB98DB90A31F08C567FD081B352E172B514C9E1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317566032.00282000.00000040.00000001.sdmp, Offset: 00282000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_282000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4d87b97619c7585f604a843092ca48d9d7c9ec08bfe3a6f28acd4f602b55c2ed
                                                    • Instruction ID: f118728f80fdd4c8a18be6b7d008cee322307208e72bbcca3d67316c04a0f53e
                                                    • Opcode Fuzzy Hash: 4d87b97619c7585f604a843092ca48d9d7c9ec08bfe3a6f28acd4f602b55c2ed
                                                    • Instruction Fuzzy Hash: 2BE0D8735003046BD2509E079C45B53FB98DB90A30F08C467FD081B312E172B514C9E1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317566032.00282000.00000040.00000001.sdmp, Offset: 00282000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_282000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e67d6978b254f0aca33ce1b667811dfc278c410baf232b8040f46700bedf57dc
                                                    • Instruction ID: 843d4b0ca9e46f9ac579cde7f80126dd850a60706e7ba3977663d60b9d15d54f
                                                    • Opcode Fuzzy Hash: e67d6978b254f0aca33ce1b667811dfc278c410baf232b8040f46700bedf57dc
                                                    • Instruction Fuzzy Hash: 48E0D8725403046BD2509E079C45B52FB98DB90A31F08C467FD085B312E172B514C9F1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fabf6635254009694cd23c764490a3dfb958a1f33eabb810305068589cfd8615
                                                    • Instruction ID: f2b06758cd49cbb089b8ed0a3c95708cd0f581e94a383f925abbec02dec316fa
                                                    • Opcode Fuzzy Hash: fabf6635254009694cd23c764490a3dfb958a1f33eabb810305068589cfd8615
                                                    • Instruction Fuzzy Hash: 8DF01534A11108EBCB08EFF8DA52A9DB775EF41315F2005A898056B390DF306F58CBA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.320361861.00F60000.00000040.00000001.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_f60000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 69221967d76bb817408a640e15b3624a85f53e409b5430ae87946313ba8ff12e
                                                    • Instruction ID: ba2ccab61112c72aa63181fdea791e6ea886f422852411ac19c9de4614d34442
                                                    • Opcode Fuzzy Hash: 69221967d76bb817408a640e15b3624a85f53e409b5430ae87946313ba8ff12e
                                                    • Instruction Fuzzy Hash: 7EE0D8725403006BD2508E079C45B52FB98DBD0A31F08C467FD081B712E172B514CAE1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.320361861.00F60000.00000040.00000001.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_f60000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a307a1a89c13cc8456f21e80a81a2899f731b383de81a674821046c71bcae01c
                                                    • Instruction ID: 3350c5f927dc3d8a35a253ffc70099e451f4480a370d76ddb194cc5d03b25721
                                                    • Opcode Fuzzy Hash: a307a1a89c13cc8456f21e80a81a2899f731b383de81a674821046c71bcae01c
                                                    • Instruction Fuzzy Hash: EEE0D8725003006BD2509E079C46B53FB98DBD0A30F08C467FD081B316E176B514C9E1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.320361861.00F60000.00000040.00000001.sdmp, Offset: 00F60000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_f60000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0018f0cf2cb51ed3cf91c64fe4d7160defa3d6b99da3a85cc33bb1015bc9163a
                                                    • Instruction ID: 99b9fec280c00ae1de2621c613a7a2e050efa8934e20c22c7bc17ed174d41a53
                                                    • Opcode Fuzzy Hash: 0018f0cf2cb51ed3cf91c64fe4d7160defa3d6b99da3a85cc33bb1015bc9163a
                                                    • Instruction Fuzzy Hash: C5E0D8725003046BD2509E079C49B53FB98DB80A31F08C467FD081B312E172B514C9F1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d798c58852af375e0082974b2f78a99b58fa14f3f2d958c15d779af09afe5f65
                                                    • Instruction ID: 519c0e70353c72b34357136754037c1f767a087f790f56733ca722003ec89ac6
                                                    • Opcode Fuzzy Hash: d798c58852af375e0082974b2f78a99b58fa14f3f2d958c15d779af09afe5f65
                                                    • Instruction Fuzzy Hash: 47F03938D42208DFCB04EFF4E5485ADBBB0FB05301F2045A9D814A3350DB709A00CF80
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5805d875a69a20ae233e606cf30d730a4703ce02c12daf831f9e189415de5890
                                                    • Instruction ID: ad997e05932d63193d2a9c01c0453fa774e629bedd9f42a43a04cce3e6d7180a
                                                    • Opcode Fuzzy Hash: 5805d875a69a20ae233e606cf30d730a4703ce02c12daf831f9e189415de5890
                                                    • Instruction Fuzzy Hash: 35E0DF3180E3889FCB079BB0EC0966CBF34EF07310F1445EAC840A3292D7344A88DB91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 65cbcb86ed6eefabfd5b3c7656c1ded09b91ac08ff052afa30c0e604341f0163
                                                    • Instruction ID: 7a98121db41626e54acba9a2d65da70bfc6f0cb67ccae5eea18a79f8b4b81343
                                                    • Opcode Fuzzy Hash: 65cbcb86ed6eefabfd5b3c7656c1ded09b91ac08ff052afa30c0e604341f0163
                                                    • Instruction Fuzzy Hash: D6E04F38D4A308DFCB04DFE9E50859CBBB5FB45305F2050A9D80993350D7715E58DB81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7ba98ec364f690ed5e1be424e3ae58b7e1993475ae0b97a4fb388dde04322711
                                                    • Instruction ID: cd7071cb261b3d9b04d65b5bf2f907c8d9553e3ca5f68386e7f1111d05849ee2
                                                    • Opcode Fuzzy Hash: 7ba98ec364f690ed5e1be424e3ae58b7e1993475ae0b97a4fb388dde04322711
                                                    • Instruction Fuzzy Hash: BED05E34D06208DBCB09EFE5E94DAADBB78EB46311F2095A8D80423250D7345A80DF95
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8cfc41f329359aa72c803d08b830b6970514cc90719e1a0a1d9573f24f3bb0d6
                                                    • Instruction ID: da057e13bff4be02e1d5e13700aba8915185208988b88a461e13e07308ca7c5c
                                                    • Opcode Fuzzy Hash: 8cfc41f329359aa72c803d08b830b6970514cc90719e1a0a1d9573f24f3bb0d6
                                                    • Instruction Fuzzy Hash: 38D01739D02209CBCB00DFA8E0846ECFB70EB89325F20942AC514A3240C7314455CF91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317531855.00262000.00000040.00000001.sdmp, Offset: 00262000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_262000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d37742569b7fae878c1127c3fcfa00cd954d9ff00fe88f864c7cdef192617a24
                                                    • Instruction ID: 695d370189d94163633194a2599fd798b483924e9c0c9ca2280df0d0bbaaf7ac
                                                    • Opcode Fuzzy Hash: d37742569b7fae878c1127c3fcfa00cd954d9ff00fe88f864c7cdef192617a24
                                                    • Instruction Fuzzy Hash: ABD05B752159918FD3168E1CC158B9537946F52704F4644F99800DB663C764D9D5D600
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.318445624.00780000.00000040.00000001.sdmp, Offset: 00780000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_780000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e532e28433095b8eb4be8b1fd7c06856390df059f93376785b15fe9a32d6dd96
                                                    • Instruction ID: aaa05033fdfe981192f1bed151e63da909f91b28375a5874a5a4264f56d7637d
                                                    • Opcode Fuzzy Hash: e532e28433095b8eb4be8b1fd7c06856390df059f93376785b15fe9a32d6dd96
                                                    • Instruction Fuzzy Hash: ACD0C93AE02208CFCB00CFA9F4445DCF771EB89225B20D46BD514B3250C7319415CF50
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.317531855.00262000.00000040.00000001.sdmp, Offset: 00262000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_262000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 02464122a5689606a24f7ff7dfb84824a565d0385f9a11e9740b27a77adb38c7
                                                    • Instruction ID: 8dfea393afad7d4bde1efa164683c1a66bfb3dcbafdb010c4b91d2eb2a43ec16
                                                    • Opcode Fuzzy Hash: 02464122a5689606a24f7ff7dfb84824a565d0385f9a11e9740b27a77adb38c7
                                                    • Instruction Fuzzy Hash: BBD05E342105828BD715CF0CC294F5977E4AF81704F1648E9BC008B366C3B8DDE4CB40
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Non-executed Functions

                                                    Execution Graph

                                                    Execution Coverage:18.2%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:15.4%
                                                    Total number of Nodes:228
                                                    Total number of Limit Nodes:12

                                                    Graph

                                                    execution_graph 36033 ed196e 36035 ed19a6 WSASocketW 36033->36035 36036 ed19e2 36035->36036 36037 f2ebf4 36038 f2ebfd 36037->36038 36049 f2fcc8 36038->36049 36039 f2f211 KiUserExceptionDispatcher 36040 f2f25f 36039->36040 36054 1090d60 36040->36054 36058 1090d1c 36040->36058 36041 f2ee92 36041->36039 36042 f2f372 36043 f2f26c 36043->36042 36062 1090fc0 36043->36062 36067 1090fb1 36043->36067 36051 f2fcfd 36049->36051 36050 f2fd5c 36050->36041 36051->36050 36072 ed075c 36051->36072 36076 ed078a 36051->36076 36055 1090d6d 36054->36055 36057 1090d74 36055->36057 36080 27a7b6 36055->36080 36057->36043 36059 1090d6d 36058->36059 36060 27a7b6 SetClipboardViewer 36059->36060 36061 1090d74 36059->36061 36060->36061 36061->36043 36063 1090fe0 36062->36063 36064 1091081 36063->36064 36084 27add6 36063->36084 36087 27ada3 36063->36087 36064->36043 36068 1090fe0 36067->36068 36069 1091081 36068->36069 36070 27add6 SetWindowsHookExW 36068->36070 36071 27ada3 SetWindowsHookExW 36068->36071 36069->36043 36070->36068 36071->36068 36074 ed078a DeleteFileW 36072->36074 36075 ed07cc 36074->36075 36075->36051 36078 ed07b0 DeleteFileW 36076->36078 36079 ed07cc 36078->36079 36079->36051 36081 27a7e2 SetClipboardViewer 36080->36081 36082 27a818 36080->36082 36083 27a7f0 36081->36083 36082->36081 36083->36057 36085 27ae26 SetWindowsHookExW 36084->36085 36086 27ae34 36085->36086 36086->36063 36088 27add6 SetWindowsHookExW 36087->36088 36090 27ae34 36088->36090 36090->36063 36091 ed0866 36092 ed08b6 SHGetFolderPathW 36091->36092 36093 ed08c4 36092->36093 36094 ed2e66 36096 ed2e9b WSAConnect 36094->36096 36097 ed2eba 36096->36097 36098 ed11e6 36099 ed1236 RegEnumKeyExW 36098->36099 36100 ed1244 36099->36100 36101 27bb2a 36104 27bb65 LoadLibraryA 36101->36104 36103 27bba2 36104->36103 36105 f2ec66 36106 f2ec6d 36105->36106 36112 f2fcc8 2 API calls 36106->36112 36107 f2f211 KiUserExceptionDispatcher 36108 f2f25f 36107->36108 36113 1090d1c SetClipboardViewer 36108->36113 36114 1090d60 SetClipboardViewer 36108->36114 36109 f2ee92 36109->36107 36110 f2f372 36111 f2f26c 36111->36110 36115 1090fb1 2 API calls 36111->36115 36116 1090fc0 2 API calls 36111->36116 36112->36109 36113->36111 36114->36111 36115->36111 36116->36111 36117 27abb2 36118 27abea RegOpenKeyExW 36117->36118 36120 27ac40 36118->36120 36124 ed3cf6 36127 ed3d2b CertVerifyCertificateChainPolicy 36124->36127 36126 ed3d5a 36127->36126 36128 ed02f6 36131 ed0325 AdjustTokenPrivileges 36128->36131 36130 ed0347 36131->36130 36132 27a23a 36133 27a266 SetErrorMode 36132->36133 36134 27a28f 36132->36134 36135 27a27b 36133->36135 36134->36133 36136 27acba 36139 27acef RegQueryValueExW 36136->36139 36138 27ad43 36139->36138 36140 ed0472 36141 ed04a7 NtQuerySystemInformation 36140->36141 36142 ed04d2 36140->36142 36143 ed04bc 36141->36143 36142->36141 36144 ed29f2 36147 ed2a27 ioctlsocket 36144->36147 36146 ed2a53 36147->36146 36148 ed0b72 36150 ed0ba7 GetFileType 36148->36150 36151 ed0bd4 36150->36151 36152 ed2ace 36154 ed2b03 WSAIoctl 36152->36154 36155 ed2b51 36154->36155 36156 27a502 36157 27a552 OleGetClipboard 36156->36157 36158 27a560 36157->36158 36159 ed22ca 36160 ed2302 CreateMutexW 36159->36160 36162 ed2345 36160->36162 36163 f01cda 36164 f01ceb 36163->36164 36165 f01fe3 KiUserExceptionDispatcher 36164->36165 36167 f01ff5 36165->36167 36166 f023dc KiUserExceptionDispatcher 36166->36167 36167->36166 36168 f02b07 36167->36168 36169 f02d05 36168->36169 36172 eff0a2 36168->36172 36180 eff1ff 36168->36180 36173 eff0b2 36172->36173 36185 ed138e 36173->36185 36189 ed1364 36173->36189 36174 eff0d2 36178 ed138e RegQueryValueExW 36174->36178 36179 ed1364 RegQueryValueExW 36174->36179 36175 eff104 36178->36175 36179->36175 36181 eff20a 36180->36181 36182 eff221 36181->36182 36193 ed1282 36181->36193 36197 ed1262 36181->36197 36186 ed13c3 RegQueryValueExW 36185->36186 36188 ed1408 36186->36188 36188->36174 36190 ed138e RegQueryValueExW 36189->36190 36192 ed1408 36190->36192 36192->36174 36194 ed12ba RegOpenKeyExW 36193->36194 36196 ed12fe 36194->36196 36196->36182 36198 ed1282 RegOpenKeyExW 36197->36198 36200 ed12fe 36198->36200 36200->36182 36214 ed00da 36217 ed0103 LookupPrivilegeValueW 36214->36217 36216 ed012a 36217->36216 36218 ed0a5a 36219 ed0a92 CreateFileW 36218->36219 36221 ed0ae1 36219->36221 36222 ed05da 36223 ed0603 CopyFileW 36222->36223 36225 ed062a 36223->36225 36226 f020ca 36228 f020db 36226->36228 36227 f023dc KiUserExceptionDispatcher 36227->36228 36228->36227 36229 f02b07 36228->36229 36230 f02d05 36229->36230 36231 eff0a2 2 API calls 36229->36231 36232 eff1ff 2 API calls 36229->36232 36231->36230 36232->36230 36233 27a09a 36234 27a0cf recv 36233->36234 36235 27a107 36233->36235 36236 27a0dd 36234->36236 36235->36234 36246 ed2cae 36247 ed2ce3 WSAEventSelect 36246->36247 36249 ed2d1a 36247->36249 36250 ed2f2e 36252 ed2f63 K32EnumProcessModules 36250->36252 36253 ed2f92 36252->36253 36254 27aaee 36255 27ab64 36254->36255 36256 27ab2c DuplicateHandle 36254->36256 36255->36256 36257 27ab3a 36256->36257 36267 ed2026 36269 ed205e MapViewOfFile 36267->36269 36270 ed20ad 36269->36270 36271 ed1f26 36273 ed1f5e OpenFileMappingW 36271->36273 36274 ed1f99 36273->36274 36275 ed06a2 36277 ed06d7 RegSetValueExW 36275->36277 36278 ed0723 36277->36278 36279 f024a0 KiUserExceptionDispatcher 36281 f0213e 36279->36281 36280 f023dc KiUserExceptionDispatcher 36280->36281 36281->36280 36282 f02b07 36281->36282 36283 f02d05 36282->36283 36284 eff0a2 2 API calls 36282->36284 36285 eff1ff 2 API calls 36282->36285 36284->36283 36285->36283 36286 27a172 36287 27a1c2 FindNextFileW 36286->36287 36288 27a1ca 36287->36288 36289 ed3136 36290 ed3186 K32GetModuleFileNameExW 36289->36290 36291 ed318e 36290->36291 36292 27b27a 36293 27b2a6 CloseHandle 36292->36293 36294 27b2e5 36292->36294 36295 27b2b4 36293->36295 36294->36293 36300 ed1486 36301 ed14f1 36300->36301 36302 ed14b2 GlobalMemoryStatusEx 36300->36302 36301->36302 36303 ed14c0 36302->36303 36304 ed2c06 36305 ed2c56 CertGetCertificateChain 36304->36305 36306 ed2c5e 36305->36306 36307 ed0d02 36309 ed0d37 setsockopt 36307->36309 36310 ed0d69 36309->36310 36320 ed259a 36322 ed25cf GetProcessTimes 36320->36322 36323 ed2601 36322->36323 36324 ed051a 36325 ed0540 CreateDirectoryW 36324->36325 36327 ed0567 36325->36327 36328 f01a0a 36336 f01a10 36328->36336 36329 f01fe3 KiUserExceptionDispatcher 36331 f01ff5 36329->36331 36330 f023dc KiUserExceptionDispatcher 36330->36331 36331->36330 36332 f02b07 36331->36332 36333 f02d05 36332->36333 36334 eff0a2 2 API calls 36332->36334 36335 eff1ff 2 API calls 36332->36335 36334->36333 36335->36333 36336->36329 36337 ed3016 36338 ed304b K32GetModuleInformation 36337->36338 36340 ed3082 36338->36340 36341 ed0996 36342 ed09c2 FindClose 36341->36342 36343 ed09f4 36341->36343 36344 ed09d7 36342->36344 36343->36342 36345 ed1796 36346 ed17cb GetNetworkParams 36345->36346 36348 ed17fb 36346->36348 36358 ed2812 36359 ed284d getaddrinfo 36358->36359 36361 ed28bf 36359->36361 36362 ed2d92 36364 ed2dc7 GetAdaptersAddresses 36362->36364 36365 ed2e00 36364->36365

                                                    Executed Functions

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: :@}l$:@}l$:@}l$X$X
                                                    • API String ID: 6842923-315616662
                                                    • Opcode ID: e4d7b58cb11fc17cf924899f7ac69bdd2a4835e8414dff7a56c7c55862aa88d8
                                                    • Instruction ID: 36243cf7d9f90aaa6e2a8ec11e49214fe81c2e45b476722a4887ab9b7fcd9209
                                                    • Opcode Fuzzy Hash: e4d7b58cb11fc17cf924899f7ac69bdd2a4835e8414dff7a56c7c55862aa88d8
                                                    • Instruction Fuzzy Hash: 59A2E7B4A40228CFCB64CF24DD84B9AB7B2FB98315F1082E6D909A7350DB319E95DF50
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: d-$l-:$l-:$l-:
                                                    • API String ID: 0-3091147437
                                                    • Opcode ID: 90dce76a8528720fca27485ffc654b52458d494863f01bd9b85551f29c446774
                                                    • Instruction ID: 588edb399aa67297a78849cb2eefbdf58642feb195b2623b8f34206cf146a336
                                                    • Opcode Fuzzy Hash: 90dce76a8528720fca27485ffc654b52458d494863f01bd9b85551f29c446774
                                                    • Instruction Fuzzy Hash: 2CA28E30B102598FDB14DBB4C8506AEB7F2AF95304F2485BAD509EB395EB34DD86CB81
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: c9082608c5fdf3fef701d585c1f3d04bd074e5ff16f27e0c14f2c04b4a3d2d4a
                                                    • Instruction ID: eec5ecd0e4150811fa73c32107a8f14915b10f3b82e0202c53c80ee5feb8ec20
                                                    • Opcode Fuzzy Hash: c9082608c5fdf3fef701d585c1f3d04bd074e5ff16f27e0c14f2c04b4a3d2d4a
                                                    • Instruction Fuzzy Hash: D9A1B6B4A401288FCBA0CF24DD8479EB7F2FB89325F1082E6990DA7350DB319E959F51
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 476e426ce967e2b8e1e4a0d376af548f4ac1d142d6d2f51ec9b78031ea17dffc
                                                    • Instruction ID: 7b27d91574e9a4db0f8bd8bed08c9d1652dcccee51e519b2d44fe09fefc79eef
                                                    • Opcode Fuzzy Hash: 476e426ce967e2b8e1e4a0d376af548f4ac1d142d6d2f51ec9b78031ea17dffc
                                                    • Instruction Fuzzy Hash: A5D1C9B4A402298FDBA0CF24DD8469AF7B2FB89315F1082E6D909A7350DB319ED4DF51
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: d-$l-:
                                                    • API String ID: 0-4218257674
                                                    • Opcode ID: 72c9fce965faf88b16c47de8962774facada6c115e960044f3fb19757c78fcad
                                                    • Instruction ID: 719ef52724a82b03b3111d7dd81f8c4a51a5c1e3ba5650543a5d819b18463ac8
                                                    • Opcode Fuzzy Hash: 72c9fce965faf88b16c47de8962774facada6c115e960044f3fb19757c78fcad
                                                    • Instruction Fuzzy Hash: C0324B70B00219CFDB54DB68C850BAEB7B2AF88304F2485BAD509EB754EB34DD858F91
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 10567 ef3af0-ef3b48 10573 ef3b4d-ef3b62 10567->10573 10574 ef3b68 10573->10574 10575 ef4087-ef408b 10573->10575 10578 ef3c0c 10574->10578 10579 ef3b99-ef3ba2 10574->10579 10580 ef3b81-ef3b97 10574->10580 10576 ef408d-ef4092 10575->10576 10577 ef40b2 10575->10577 10583 ef4057-ef4068 10576->10583 10582 ef40b7-ef418d 10577->10582 10584 ef3c14-ef3c16 10578->10584 10581 ef3ba8-ef3bd4 10579->10581 10579->10582 10580->10573 10603 ef3c2c-ef3c30 10581->10603 10604 ef3bd6-ef3bdb 10581->10604 10669 ef418f call f03eb0 10582->10669 10670 ef418f call f03ea0 10582->10670 10585 ef406a 10583->10585 10586 ef40a7-ef40b1 10583->10586 10590 ef3cbe-ef3d0d 10584->10590 10591 ef3c1c-ef3c27 10584->10591 10585->10575 10585->10586 10592 ef4094-ef409a 10585->10592 10593 ef4052 10585->10593 10594 ef4071-ef407a 10585->10594 10590->10594 10591->10573 10595 ef3e28-ef3e5a 10592->10595 10596 ef40a0-ef40a5 10592->10596 10593->10583 10598 ef3be0-ef3be9 10594->10598 10599 ef4080-ef4085 10594->10599 10620 ef404c-ef4050 10595->10620 10621 ef3e60-ef3e77 10595->10621 10596->10583 10598->10582 10600 ef3bef-ef3bf3 10598->10600 10599->10583 10608 ef3bfa-ef3bfc 10600->10608 10603->10577 10609 ef3c36-ef3c3b 10603->10609 10604->10573 10606 ef4194-ef41c5 10611 ef3d7b-ef3dc0 10608->10611 10612 ef3c02-ef3c07 10608->10612 10609->10573 10627 ef3dfa-ef3e07 10611->10627 10628 ef3dc2 10611->10628 10612->10573 10612->10578 10620->10577 10620->10593 10629 ef3e79 10621->10629 10630 ef3dc7-ef3ddc 10627->10630 10628->10630 10631 ef3e7e-ef3e93 10629->10631 10630->10595 10632 ef3dde 10630->10632 10631->10620 10633 ef3e99 10631->10633 10632->10575 10632->10586 10632->10592 10632->10593 10632->10594 10632->10595 10632->10620 10632->10627 10632->10628 10632->10629 10634 ef400d-ef4011 10632->10634 10635 ef3e09-ef3e12 10632->10635 10636 ef3ec7-ef3ecb 10632->10636 10637 ef3de5-ef3df8 10632->10637 10638 ef3f05-ef3f29 10632->10638 10639 ef3ea0-ef3ec5 10632->10639 10640 ef3f80-ef3f98 10632->10640 10641 ef3ede-ef3f00 10632->10641 10642 ef3f9d-ef3fb3 10632->10642 10643 ef3fb8-ef3fc7 10632->10643 10644 ef3f54-ef3f7b 10632->10644 10633->10575 10633->10586 10633->10592 10633->10593 10633->10594 10633->10620 10633->10629 10633->10634 10633->10636 10633->10638 10633->10639 10633->10640 10633->10641 10633->10642 10633->10643 10633->10644 10645 ef4013-ef4020 10634->10645 10646 ef4022 10634->10646 10635->10577 10647 ef3e18-ef3e22 10635->10647 10636->10620 10650 ef3ed1-ef3edc 10636->10650 10637->10630 10665 ef3f2b-ef3f35 10638->10665 10666 ef3f37 10638->10666 10639->10631 10640->10631 10641->10631 10642->10631 10648 ef3fc9-ef3fd0 10643->10648 10649 ef3fd8-ef4008 10643->10649 10644->10631 10653 ef4027-ef4029 10645->10653 10646->10653 10647->10595 10647->10596 10648->10649 10649->10631 10650->10631 10653->10620 10658 ef402b-ef4036 10653->10658 10658->10620 10658->10631 10667 ef3f3c-ef3f3e 10665->10667 10666->10667 10667->10620 10668 ef3f44-ef3f4f 10667->10668 10668->10631 10669->10606 10670->10606
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :@}l
                                                    • API String ID: 0-282943697
                                                    • Opcode ID: 1a94ecdf3664356ad404471fff57220f538ab657cd645185fbc96d23a5c53d4f
                                                    • Instruction ID: d732ccf98bbb7eb4baa98426cadb220ac48f37e902da9613845477834665726b
                                                    • Opcode Fuzzy Hash: 1a94ecdf3664356ad404471fff57220f538ab657cd645185fbc96d23a5c53d4f
                                                    • Instruction Fuzzy Hash: FFF10370B142498FCB04DBB9C8505EEBBF2AF95350B14806AD605FB395DB38DD46CB92
                                                    Uniqueness

                                                    Uniqueness Score: 7.75%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 13887 ef9f80-ef9fa8 13889 ef9faf 13887->13889 13890 ef9fb4-ef9fc3 13889->13890 13891 efa03f-efa07e 13890->13891 13892 ef9fc5 13890->13892 13916 efa496 13891->13916 13975 efa084-efa089 13891->13975 13892->13889 13892->13891 13893 efa0ad-efa0b2 13892->13893 13894 ef9fcc-ef9fe9 13892->13894 13895 efa08c 13892->13895 13896 ef9feb-efa020 13892->13896 13897 efa0b7-efa0c0 13892->13897 13898 efa136-efa13f 13892->13898 13899 efa185-efa1a4 13892->13899 13900 efa0f3-efa0fc 13892->13900 13901 efa45b-efa464 13893->13901 13894->13890 13906 efa091-efa0a0 13895->13906 13978 efa027-efa029 13896->13978 13902 efa49b-efa4c4 13897->13902 13903 efa0c6-efa0e6 13897->13903 13898->13902 13907 efa145-efa180 13898->13907 13912 efa431-efa437 13899->13912 13920 efa1aa-efa1e8 13899->13920 13900->13902 13905 efa102-efa110 13900->13905 13901->13900 13908 efa46a-efa46f 13901->13908 13986 efa4d0-efa4d9 13902->13986 13934 efa471-efa477 13903->13934 13968 efa0ec-efa0f1 13903->13968 13911 efa116-efa11b 13905->13911 13905->13912 13906->13899 13913 efa0a6 13906->13913 13907->13906 13919 efa441-efa452 13908->13919 13911->13906 13915 efa439 13912->13915 13912->13916 13913->13893 13913->13895 13913->13897 13913->13898 13913->13899 13913->13900 13913->13912 13922 efa38f-efa3ab 13913->13922 13923 efa30d-efa329 13913->13923 13924 efa3e7-efa3fe 13913->13924 13925 efa483-efa489 13913->13925 13926 efa3c1-efa3e2 13913->13926 13927 efa120-efa131 13913->13927 13928 efa2a0-efa2bd 13913->13928 13929 efa2bf-efa2de 13913->13929 13930 efa43c 13913->13930 13931 efa279 13913->13931 13932 efa339-efa342 13913->13932 13933 efa374-efa38a 13913->13933 13913->13934 13915->13930 13916->13902 13938 efa4c6-efa4cf 13919->13938 13939 efa454 13919->13939 13967 efa403-efa42c 13920->13967 13977 efa1ee-efa206 13920->13977 13922->13923 13942 efa3b1-efa3bc 13922->13942 13923->13912 13935 efa32f-efa334 13923->13935 13944 efa27e-efa293 13924->13944 13925->13897 13943 efa48f-efa494 13925->13943 13926->13944 13927->13906 13928->13944 13966 efa2e4-efa308 13929->13966 13929->13967 13930->13919 13931->13944 13936 efa34f-efa36f 13932->13936 13937 efa344-efa348 13932->13937 13933->13944 13934->13916 13941 efa479-efa481 13934->13941 13935->13944 13936->13944 13937->13936 13939->13901 13939->13925 13939->13930 13939->13934 13939->13938 13941->13919 13942->13944 13943->13919 13944->13912 13945 efa299 13944->13945 13945->13901 13945->13912 13945->13922 13945->13923 13945->13924 13945->13925 13945->13926 13945->13928 13945->13929 13945->13930 13945->13931 13945->13932 13945->13933 13945->13934 13945->13938 13966->13944 13967->13986 13968->13906 13975->13895 13977->13967 13984 efa20c-efa226 13977->13984 13978->13938 13980 efa02f-efa03a 13978->13980 13980->13890 13984->13967 13989 efa22c-efa24d 13984->13989 13989->13967 13992 efa253-efa26d 13989->13992 13992->13967 13995 efa273-efa276 13992->13995 13995->13931
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :@}l
                                                    • API String ID: 0-282943697
                                                    • Opcode ID: a0f04bf23fade4f6e23494a43dcf27bafc515aeeff3737c282953f8535b0306a
                                                    • Instruction ID: 62823fa172f5568763f515c9e3d0e2ed9648e1fb4cf8534c227c09ab1cd1844c
                                                    • Opcode Fuzzy Hash: a0f04bf23fade4f6e23494a43dcf27bafc515aeeff3737c282953f8535b0306a
                                                    • Instruction Fuzzy Hash: 45E17B70B00108CBCB04DBA8D5856ADB7F2EF98304B299935E61AEF395DB35DC45CB52
                                                    Uniqueness

                                                    Uniqueness Score: 7.75%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 14136 ef96a9-ef96e5 14139 ef96e8 14136->14139 14140 ef96ed-ef9702 14139->14140 14141 ef9708 14140->14141 14142 ef97b6-ef97d2 14140->14142 14141->14139 14141->14142 14143 ef970f-ef9755 14141->14143 14144 ef9aae-ef9acc 14141->14144 14145 ef976d-ef97b1 14141->14145 14146 ef98ad 14141->14146 14147 ef9a86-ef9a9e 14141->14147 14148 ef9a06-ef9a15 14141->14148 14149 ef9a25-ef9a59 14141->14149 14150 ef9944-ef996e 14141->14150 14151 ef99a2-ef99d6 14141->14151 14152 ef98e1-ef9909 14141->14152 14153 ef983e-ef9860 14141->14153 14154 ef9a5e-ef9a76 14141->14154 14155 ef991c-ef9934 14141->14155 14156 ef99db-ef99f4 14141->14156 14157 ef9ad8-ef9aed 14141->14157 14158 ef98d4-ef98df 14141->14158 14159 ef97d3-ef980d 14141->14159 14160 ef9973-ef999d 14141->14160 14161 ef9812 14141->14161 14162 ef9831-ef983c 14141->14162 14236 ef975c-ef975e 14143->14236 14144->14154 14207 ef9ace-ef9ad3 14144->14207 14145->14140 14165 ef98b2-ef98c7 14146->14165 14147->14148 14215 ef9aa4-ef9aa9 14147->14215 14148->14144 14187 ef9a1b-ef9a20 14148->14187 14149->14165 14150->14165 14151->14165 14152->14148 14227 ef990f-ef991a 14152->14227 14211 ef987c-ef98ac 14153->14211 14212 ef9862-ef9874 14153->14212 14154->14155 14214 ef9a7c-ef9a81 14154->14214 14155->14147 14209 ef993a-ef993f 14155->14209 14156->14148 14208 ef99f6-ef9a01 14156->14208 14186 ef9b07 14157->14186 14158->14165 14185 ef9b83-ef9b92 14159->14185 14160->14165 14164 ef9817-ef9828 14161->14164 14162->14164 14164->14153 14171 ef982a 14164->14171 14165->14157 14178 ef98cd 14165->14178 14171->14144 14171->14146 14171->14147 14171->14148 14171->14149 14171->14150 14171->14151 14171->14152 14171->14153 14171->14154 14171->14155 14171->14156 14171->14157 14171->14158 14171->14160 14171->14161 14171->14162 14171->14185 14171->14186 14188 ef9ba2-ef9bb7 14171->14188 14189 ef9b31-ef9b40 14171->14189 14178->14144 14178->14146 14178->14147 14178->14148 14178->14149 14178->14150 14178->14151 14178->14152 14178->14154 14178->14155 14178->14156 14178->14157 14178->14158 14178->14160 14178->14185 14178->14186 14178->14188 14178->14189 14185->14162 14220 ef9b98-ef9b9d 14185->14220 14194 ef9b0c-ef9b1b 14186->14194 14187->14165 14222 ef9bb8 14188->14222 14195 ef9b42-ef9b49 14189->14195 14196 ef9b51-ef9b81 14189->14196 14194->14188 14210 ef9b21 14194->14210 14195->14196 14196->14194 14207->14165 14208->14165 14209->14165 14210->14185 14210->14186 14210->14188 14210->14189 14211->14146 14212->14211 14214->14165 14215->14165 14220->14194 14222->14222 14227->14165 14236->14142 14237 ef9760-ef976b 14236->14237 14237->14140
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: l-:
                                                    • API String ID: 0-1487562763
                                                    • Opcode ID: ece65b4c215389a6293d484551c412f7464c35d38eceb8ae2d9c8d17a03b794f
                                                    • Instruction ID: caf7ff65f03da609fe69e300b4f2e8a106de6653742e973c680dbb384c0ed9d2
                                                    • Opcode Fuzzy Hash: ece65b4c215389a6293d484551c412f7464c35d38eceb8ae2d9c8d17a03b794f
                                                    • Instruction Fuzzy Hash: 5ED19D30F002498BDB18DFB5D5906AEB3B2AFD5344F20863AD549AB396EB34DD45CB81
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 14238 ef96b8-ef96e5 14241 ef96e8 14238->14241 14242 ef96ed-ef9702 14241->14242 14243 ef9708 14242->14243 14244 ef97b6-ef97d2 14242->14244 14243->14241 14243->14244 14245 ef970f-ef9755 14243->14245 14246 ef9aae-ef9acc 14243->14246 14247 ef976d-ef97b1 14243->14247 14248 ef98ad 14243->14248 14249 ef9a86-ef9a9e 14243->14249 14250 ef9a06-ef9a15 14243->14250 14251 ef9a25-ef9a59 14243->14251 14252 ef9944-ef996e 14243->14252 14253 ef99a2-ef99d6 14243->14253 14254 ef98e1-ef9909 14243->14254 14255 ef983e-ef9860 14243->14255 14256 ef9a5e-ef9a76 14243->14256 14257 ef991c-ef9934 14243->14257 14258 ef99db-ef99f4 14243->14258 14259 ef9ad8-ef9aed 14243->14259 14260 ef98d4-ef98df 14243->14260 14261 ef97d3-ef980d 14243->14261 14262 ef9973-ef999d 14243->14262 14263 ef9812 14243->14263 14264 ef9831-ef983c 14243->14264 14338 ef975c-ef975e 14245->14338 14246->14256 14309 ef9ace-ef9ad3 14246->14309 14247->14242 14267 ef98b2-ef98c7 14248->14267 14249->14250 14317 ef9aa4-ef9aa9 14249->14317 14250->14246 14289 ef9a1b-ef9a20 14250->14289 14251->14267 14252->14267 14253->14267 14254->14250 14329 ef990f-ef991a 14254->14329 14313 ef987c-ef98ac 14255->14313 14314 ef9862-ef9874 14255->14314 14256->14257 14316 ef9a7c-ef9a81 14256->14316 14257->14249 14311 ef993a-ef993f 14257->14311 14258->14250 14310 ef99f6-ef9a01 14258->14310 14288 ef9b07 14259->14288 14260->14267 14287 ef9b83-ef9b92 14261->14287 14262->14267 14266 ef9817-ef9828 14263->14266 14264->14266 14266->14255 14273 ef982a 14266->14273 14267->14259 14280 ef98cd 14267->14280 14273->14246 14273->14248 14273->14249 14273->14250 14273->14251 14273->14252 14273->14253 14273->14254 14273->14255 14273->14256 14273->14257 14273->14258 14273->14259 14273->14260 14273->14262 14273->14263 14273->14264 14273->14287 14273->14288 14290 ef9ba2-ef9bb7 14273->14290 14291 ef9b31-ef9b40 14273->14291 14280->14246 14280->14248 14280->14249 14280->14250 14280->14251 14280->14252 14280->14253 14280->14254 14280->14256 14280->14257 14280->14258 14280->14259 14280->14260 14280->14262 14280->14287 14280->14288 14280->14290 14280->14291 14287->14264 14322 ef9b98-ef9b9d 14287->14322 14296 ef9b0c-ef9b1b 14288->14296 14289->14267 14324 ef9bb8 14290->14324 14297 ef9b42-ef9b49 14291->14297 14298 ef9b51-ef9b81 14291->14298 14296->14290 14312 ef9b21 14296->14312 14297->14298 14298->14296 14309->14267 14310->14267 14311->14267 14312->14287 14312->14288 14312->14290 14312->14291 14313->14248 14314->14313 14316->14267 14317->14267 14322->14296 14324->14324 14329->14267 14338->14244 14339 ef9760-ef976b 14338->14339 14339->14242
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: l-:
                                                    • API String ID: 0-1487562763
                                                    • Opcode ID: 6c3c383e3baeb64e62cd12cbd63ac7cd68d50160434893f1aa3c561c13d9078e
                                                    • Instruction ID: 97144a0f29f2fbbda570c660944a9b90adfed095438c30e925489aa22abe583d
                                                    • Opcode Fuzzy Hash: 6c3c383e3baeb64e62cd12cbd63ac7cd68d50160434893f1aa3c561c13d9078e
                                                    • Instruction Fuzzy Hash: ADD18D30B002498BDB18DFB5D9506AEB7B2AFD5344F20863AD509BB396EB34DD45CB81
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00ED033F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AdjustPrivilegesToken
                                                    • String ID:
                                                    • API String ID: 2874748243-0
                                                    • Opcode ID: 1f0155d82f451cf0ee91170538bbf342717ca0cb7ae38d4b2d5d56a61eb839fa
                                                    • Instruction ID: 8e1c8208c554024e9bdbf139025e9e69d0a65bb58d65272a3000a7e130c7d8bb
                                                    • Opcode Fuzzy Hash: 1f0155d82f451cf0ee91170538bbf342717ca0cb7ae38d4b2d5d56a61eb839fa
                                                    • Instruction Fuzzy Hash: 2C219F765097809FEB12CF25DC45B52BFB4EF17314F0885DAE9858B263D2719908CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.29%

                                                    APIs
                                                    • NtQuerySystemInformation.NTDLL(?,?,?,?), ref: 00ED04AD
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: InformationQuerySystem
                                                    • String ID:
                                                    • API String ID: 3562636166-0
                                                    • Opcode ID: 71f24ee84943bf4934f5e8fd18fdb46da6437013b45cdd551561b611adf6289c
                                                    • Instruction ID: c486b36d6b79c5ff142b676f60dd2a6c8e78de65510ffc2c91d2e9c68d113a28
                                                    • Opcode Fuzzy Hash: 71f24ee84943bf4934f5e8fd18fdb46da6437013b45cdd551561b611adf6289c
                                                    • Instruction Fuzzy Hash: 8B118B724097809FDB228F24DC45A52FFB4EF17324F0980DAE9859B663D265A918CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 00ED033F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AdjustPrivilegesToken
                                                    • String ID:
                                                    • API String ID: 2874748243-0
                                                    • Opcode ID: 050c0b93ad9abba84ed809f90dda55930f970c2af7dfc3853772d84949a6aa08
                                                    • Instruction ID: 6556ece60e2c9d80b3458fd4b326d8f77790bf591bf2f7a22756b37aeeee3517
                                                    • Opcode Fuzzy Hash: 050c0b93ad9abba84ed809f90dda55930f970c2af7dfc3853772d84949a6aa08
                                                    • Instruction Fuzzy Hash: 9811A0325007009FDB20CF55D884B56FBE8EF15320F0888ABED458B711D371E418DB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.29%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: recv
                                                    • String ID:
                                                    • API String ID: 1507349165-0
                                                    • Opcode ID: c3c163af81a8ed1c1ef0765eb36f1c66b3712f178e9e44da47dd60cda2563be2
                                                    • Instruction ID: f4144e93bfae31934af0b8b29e19437e71f605794698e4348751f3738573c899
                                                    • Opcode Fuzzy Hash: c3c163af81a8ed1c1ef0765eb36f1c66b3712f178e9e44da47dd60cda2563be2
                                                    • Instruction Fuzzy Hash: BF01B1324107409FEF20CF55D885B66FBA4EF55324F08C8AAED498B216D371E468CFA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • NtQuerySystemInformation.NTDLL(?,?,?,?), ref: 00ED04AD
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: InformationQuerySystem
                                                    • String ID:
                                                    • API String ID: 3562636166-0
                                                    • Opcode ID: 1b60dd28f2fbfa9ad6b9446160ca8300d26379001037c9c66f09fe6e305b198b
                                                    • Instruction ID: 98e083fdba59cd3f3c1d68f85ac5a80122f911124e9338eeeb1041e2d5faa1a7
                                                    • Opcode Fuzzy Hash: 1b60dd28f2fbfa9ad6b9446160ca8300d26379001037c9c66f09fe6e305b198b
                                                    • Instruction Fuzzy Hash: 53018B364007449FEB208F45D985B61FBA0EF65324F08C49AEE895B712D376E818DBA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :@}l
                                                    • API String ID: 0-282943697
                                                    • Opcode ID: f478b674b378517f0759fefd7c26b6206bf0bbb088659858cef4948a3095d318
                                                    • Instruction ID: 3ca572c84dbb55cef7418470c8fc8d5b23ebfbeb581fe5d5900c097fb94c30d7
                                                    • Opcode Fuzzy Hash: f478b674b378517f0759fefd7c26b6206bf0bbb088659858cef4948a3095d318
                                                    • Instruction Fuzzy Hash: 7A711B307142408FCF456BB888212AE7BABAFDD304F54847AA409DB3D6DE388C499762
                                                    Uniqueness

                                                    Uniqueness Score: 7.75%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: #~P
                                                    • API String ID: 0-3374738924
                                                    • Opcode ID: 5a0f3ecb5cf52409d26a0283eec0e86f66445a5b008acf27c9cb5e374c8bb3e6
                                                    • Instruction ID: 186ca35d5c43aed2d620d21ad7daf04f352174c53e87966cd63f18e7840806ce
                                                    • Opcode Fuzzy Hash: 5a0f3ecb5cf52409d26a0283eec0e86f66445a5b008acf27c9cb5e374c8bb3e6
                                                    • Instruction Fuzzy Hash: DE71F230B101088FCB08EBB8D8551ADB2E7EFD9319B609939E606EB394DF35DC528B51
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: #~P
                                                    • API String ID: 0-3374738924
                                                    • Opcode ID: 7e1535d2233639e964b3d7dca4b0b39ef2e9fa11d0a8164ea2b22079dac0ff2e
                                                    • Instruction ID: 1621810f97d7640b943214c84974aad91ea2d5e1bf82ba1c73c79f24b44777e7
                                                    • Opcode Fuzzy Hash: 7e1535d2233639e964b3d7dca4b0b39ef2e9fa11d0a8164ea2b22079dac0ff2e
                                                    • Instruction Fuzzy Hash: 7D61F130B101088FCB08DBB8D8556AEB3E3EBD9315B608539E606EB364DF34DC528B91
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: :@}l
                                                    • API String ID: 0-282943697
                                                    • Opcode ID: 5361f4e7135079487155ec99abd1f566e9a97d7b7f25edfad240087138931e35
                                                    • Instruction ID: 262742dee4a06a7131ab300efa36715ae1481fe0bd249b92951265d616cc6be1
                                                    • Opcode Fuzzy Hash: 5361f4e7135079487155ec99abd1f566e9a97d7b7f25edfad240087138931e35
                                                    • Instruction Fuzzy Hash: 0451A4317101048FDF486AB988617AEB69FABDC308F508839A909DB7D9DE34CC595762
                                                    Uniqueness

                                                    Uniqueness Score: 7.75%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2cf8cd7a048e3f5b636629ef0ad147413058f8e327dc5d06d39ad53dbae17a5a
                                                    • Instruction ID: e96b72e39e85379a40944e9c46f554b1f62a7d450a1fc39c447102ac88e5f35b
                                                    • Opcode Fuzzy Hash: 2cf8cd7a048e3f5b636629ef0ad147413058f8e327dc5d06d39ad53dbae17a5a
                                                    • Instruction Fuzzy Hash: C2621370B052458FDB14CB68C8807AEFBB2EF95314F14C56AD90A9B291CB34ED46EB91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 40373e361b95e696303aac5bde375185d295202449bef6317a8213492f83134f
                                                    • Instruction ID: 342302961ec780cdfda989b8ca00b4d508ee85223a504ebdbc08c353ae0cde69
                                                    • Opcode Fuzzy Hash: 40373e361b95e696303aac5bde375185d295202449bef6317a8213492f83134f
                                                    • Instruction Fuzzy Hash: 50620870A006598FCB64DF28C984A9EB7F2FF98304F1085E9D40DAB755DB34AE859F90
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e064bce1dff1360d11ef44eb3960278732c22bc390303d67252dd12bc5a500ba
                                                    • Instruction ID: da48eef058ee4f0200a0d7deca84d4c78ce41c1db4dabd5744e443242c7dc461
                                                    • Opcode Fuzzy Hash: e064bce1dff1360d11ef44eb3960278732c22bc390303d67252dd12bc5a500ba
                                                    • Instruction Fuzzy Hash: 4832AE35B00619CFDB08DB78D9806ADB7F2AF94304F64946AD60AEB391DB34DD45CB81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fd45079c232ea67bd18d6f12195a5de684cec5882beea207fe00468726e6554c
                                                    • Instruction ID: 05b968c58bf8609eb7c41d6e45e84c15c4dce49a34b4790fd4009c0dad4b7a88
                                                    • Opcode Fuzzy Hash: fd45079c232ea67bd18d6f12195a5de684cec5882beea207fe00468726e6554c
                                                    • Instruction Fuzzy Hash: 2B129A31A04249CFCB14DFA4C9949ADFBB2BF84314F25C5AAD519AB356CB34EC85CB81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 062c5eafd350b15a5f3930bb4a8b91d4bbcfa5e0cd430793ddcb448450bf82d0
                                                    • Instruction ID: d14c857e4fc17601b0575c696ab3aa4cf1200ad3fe74c2fed5b8aefff8304a82
                                                    • Opcode Fuzzy Hash: 062c5eafd350b15a5f3930bb4a8b91d4bbcfa5e0cd430793ddcb448450bf82d0
                                                    • Instruction Fuzzy Hash: A7321570A016598FCB64DF28C984A9EB7F2EF98304F10C5E9D44DAB355DB34AE818F90
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1b0b5f631e774442ea7087c57ec63125bdcd54d9d3791a00edb8d7d8a4963cff
                                                    • Instruction ID: b7ea7e9606b02160a77867f6b540c4981c7be32d14bf8c620295bf9bd74fbac6
                                                    • Opcode Fuzzy Hash: 1b0b5f631e774442ea7087c57ec63125bdcd54d9d3791a00edb8d7d8a4963cff
                                                    • Instruction Fuzzy Hash: 09F1AC34B0010C9FDB04EBB8DA54AADB7A3AF84364F349576E616AB3E4DB30DC518B41
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d633b8f1e614b69c93448a4013b714c07d6cc4b22553d5f0dfd2c0444dc551e3
                                                    • Instruction ID: f7c1c1d0d793bfd57594dcbf65f00afbbfbe44ca0766683da7f5f0d65e722f7d
                                                    • Opcode Fuzzy Hash: d633b8f1e614b69c93448a4013b714c07d6cc4b22553d5f0dfd2c0444dc551e3
                                                    • Instruction Fuzzy Hash: 2A122770A0165A8FCB60DF28C984A9EF7F2EF98304F10C5A9D44DAB755DB34AD818F91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8ab52d602e8567380fba563a32524dcac59cbd8b5b3d9ebf8153478d6ab9c19e
                                                    • Instruction ID: 46bc55ead72cc912b58332db4c6e00b6f3560d7f80f11a1b595feda3d67d8260
                                                    • Opcode Fuzzy Hash: 8ab52d602e8567380fba563a32524dcac59cbd8b5b3d9ebf8153478d6ab9c19e
                                                    • Instruction Fuzzy Hash: 91122870A0165A8FCB60DF28C984A9EF7F2EF98304F10C5A9D44DAB755DB34AD818F91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9c8ac9bd9a169e2f2792e946a0f71daf28b48cc008a04215e31540afc05dee81
                                                    • Instruction ID: a263678e08af5f186c5e226852d0a295b64ef0e8aa039d013905a307e888d81d
                                                    • Opcode Fuzzy Hash: 9c8ac9bd9a169e2f2792e946a0f71daf28b48cc008a04215e31540afc05dee81
                                                    • Instruction Fuzzy Hash: D1122870A0165A8FCB60DF28C984A9EF7F2EF98304F10C5A9D44E9B755DB34AD818F91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3305f00cf85ad9b0434073eab2afaba803bf2b84110739ff61f7dd971c78a77d
                                                    • Instruction ID: b2a7a5904be54770e3e74daac2ee7b356c95a83908f0caea2adc9a97781357a9
                                                    • Opcode Fuzzy Hash: 3305f00cf85ad9b0434073eab2afaba803bf2b84110739ff61f7dd971c78a77d
                                                    • Instruction Fuzzy Hash: A1022770A0165A8FCB60DF28C984A9EF7F2EF98304F10C5A9D44E9B755DB34AD818F91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 368094df314932e69121eb0c27b695b456221984e6d77e888152b712743a7e76
                                                    • Instruction ID: c208ba533a46f3bf16f8adf2fbb3caccf3d30a60c45a169c549d0988b45f45d6
                                                    • Opcode Fuzzy Hash: 368094df314932e69121eb0c27b695b456221984e6d77e888152b712743a7e76
                                                    • Instruction Fuzzy Hash: F612C170A05229CFDB64CF69C984BDDB7B1BF89304F5085EAD509AB250DB30AE85CF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5195144875bd100822379a84efc40f43da4673efcdf95a86fb197898660e9ebc
                                                    • Instruction ID: a7c7bf3daa2cba73da09de95945e337348d3e26fffdef30c66e08afa92cf2a6b
                                                    • Opcode Fuzzy Hash: 5195144875bd100822379a84efc40f43da4673efcdf95a86fb197898660e9ebc
                                                    • Instruction Fuzzy Hash: C002D730E1065A8ADB10EB68CD51AD9F3B1BF95304F1086EAE54D77290EB70AAC5CF91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 07a2e9ca888e5ec26f21980fd9da85f713cc4f3a56c7800265b60406086d88f2
                                                    • Instruction ID: bf1af039f07e9b2acda976cb16cf8af478a760b44ddc000236774573b070b522
                                                    • Opcode Fuzzy Hash: 07a2e9ca888e5ec26f21980fd9da85f713cc4f3a56c7800265b60406086d88f2
                                                    • Instruction Fuzzy Hash: E202E630E1066ACADB10EB68CD516D9F3B1BF95304F1086EAE54D7B250EB70AAC5CF91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ea68f3ab411390befa2fdf6abf3db90d51aaa92549c3e4e4292cb50fecf0e862
                                                    • Instruction ID: d040caa686a9c669b282f1addcb4eb9ae9a5a7fb7223774d6102f2ddddba37fb
                                                    • Opcode Fuzzy Hash: ea68f3ab411390befa2fdf6abf3db90d51aaa92549c3e4e4292cb50fecf0e862
                                                    • Instruction Fuzzy Hash: E2B1D730A1C2C68FD701EB75C4546ED7FE2AF92244F5984FFC0849B196DBBA8985C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1d8939b06dbd6dd3dc29fd250ca9772362951691966593c317544521d06a5113
                                                    • Instruction ID: 44563731bde7151aa4090adb496caa864b4e8a7843fcc4db47cc9aa903608103
                                                    • Opcode Fuzzy Hash: 1d8939b06dbd6dd3dc29fd250ca9772362951691966593c317544521d06a5113
                                                    • Instruction Fuzzy Hash: 74B1E730B1C3C68FD701EB75C8640ED7FE2AF92294B9945BFC0449B196EA79C986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f1c01e4a9c143f5af8d39e45f3df3c8a86094f225805a1a46114ab540f37e0d6
                                                    • Instruction ID: 4774c3e0d60214cf3cd3f2f78f35029c1c56aaf8b190aa8dc88b3e276a01e3f7
                                                    • Opcode Fuzzy Hash: f1c01e4a9c143f5af8d39e45f3df3c8a86094f225805a1a46114ab540f37e0d6
                                                    • Instruction Fuzzy Hash: CEA10730B1C3C68FD701EB75C8640ED7FE2AF92294B9445BFC045DB196DA798986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ab254d766ff8e06988d742a04c900ea9566d4059b6a03198395b84a44ac220ce
                                                    • Instruction ID: 0631db3023cc5ca3072c710cdbaab7d5ddcbc7f80456480b530b099acc48253f
                                                    • Opcode Fuzzy Hash: ab254d766ff8e06988d742a04c900ea9566d4059b6a03198395b84a44ac220ce
                                                    • Instruction Fuzzy Hash: A9A11930B1C2C68FDB01EBB5C8640ED7FE29F92294B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 30b03bb1e7d7e7333ded5ed0876ab905283d1d38b878efd28272fa1a293a4fe1
                                                    • Instruction ID: d9b44b05d8ee84d974330820c71f3e452aa2692fd445d651c005c3a80e2719b2
                                                    • Opcode Fuzzy Hash: 30b03bb1e7d7e7333ded5ed0876ab905283d1d38b878efd28272fa1a293a4fe1
                                                    • Instruction Fuzzy Hash: 12A11830B1C2C68FD701EBB5C8641ED7FE29F92294B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dd297c124789f03127bc3eebfa491af3ef402b3722b9e55871a786febc5126c4
                                                    • Instruction ID: 305f455d4c3ef382590f075bda57f73f189455e70eee63b5df02af7272b6a7a8
                                                    • Opcode Fuzzy Hash: dd297c124789f03127bc3eebfa491af3ef402b3722b9e55871a786febc5126c4
                                                    • Instruction Fuzzy Hash: D5A12730B1C2C68FD701EBB5C8640ED7FE29F92254B9445BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3e11e4ae5c69679bd5b0ab9784200441e9ced9e7d092e3d547f80816622175a0
                                                    • Instruction ID: d599a2099aa19d5f307571e67bb476c13f3681c088c5e065f2d161526def1f9c
                                                    • Opcode Fuzzy Hash: 3e11e4ae5c69679bd5b0ab9784200441e9ced9e7d092e3d547f80816622175a0
                                                    • Instruction Fuzzy Hash: 69A10830B1C2C68FD701EBB5C8641ED7FE29F92294B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 831386624ce1fcb3f18d025d8262f0c9ed0877913ec0c2149d25b2bce7485dd5
                                                    • Instruction ID: ff4e75a68fb6d07ffe98ce748bfd1728be842cab20de0d18f1344fd8829324b8
                                                    • Opcode Fuzzy Hash: 831386624ce1fcb3f18d025d8262f0c9ed0877913ec0c2149d25b2bce7485dd5
                                                    • Instruction Fuzzy Hash: A9A11830B1C3C68FD701EBB5C8640ED7FE29F92194B9445BFC045DB196EA798986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6ebac8a55c3db86fc9ea3e9b569bb0bdc12d1cb714045f2b225e9c8347d8ac6d
                                                    • Instruction ID: 0aba9ebc369e8fc4f433fec4033007aed37c2ecafffaf5b1d7f0b4844f791c94
                                                    • Opcode Fuzzy Hash: 6ebac8a55c3db86fc9ea3e9b569bb0bdc12d1cb714045f2b225e9c8347d8ac6d
                                                    • Instruction Fuzzy Hash: E5A12830B1C3C68FD701EBB5C8641ED7FE29F92254B9444BFC044DB196EA798986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b3e9cb07b8a9b604542b3c9844b40ed8d9fadb08933989eb12db7d0ec0137194
                                                    • Instruction ID: a027168766d2944a773c485feb6457eab9bf3573ecb5c8d8105beac780f2a20b
                                                    • Opcode Fuzzy Hash: b3e9cb07b8a9b604542b3c9844b40ed8d9fadb08933989eb12db7d0ec0137194
                                                    • Instruction Fuzzy Hash: EAA11B30B5C2C68FDB01EBB5C8640ED7FE29F92154B9444BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0dc5be6c679dc80cd320cda01e017a29c010fafa2b2af15204acd6b213b555ea
                                                    • Instruction ID: 45754a58b4d6ded3182dfeed947e1d8186b8583b887fb037fda9b3184d482af0
                                                    • Opcode Fuzzy Hash: 0dc5be6c679dc80cd320cda01e017a29c010fafa2b2af15204acd6b213b555ea
                                                    • Instruction Fuzzy Hash: 12A10830B1C2C68FD701EBB5C8640ED7FE29F92194B9444BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4b32f700f20dd3c4010adc521ec5f5289d14434a5164cccfed2596c849763ce2
                                                    • Instruction ID: 1e5d5b34afe90b765a24a549608d45938436a15926019dca06b329a8bd420fb0
                                                    • Opcode Fuzzy Hash: 4b32f700f20dd3c4010adc521ec5f5289d14434a5164cccfed2596c849763ce2
                                                    • Instruction Fuzzy Hash: 2FA11830B1C2C68FDB01EBB5C8640ED7FE29F92194B9445BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0145596477e094336abc48c3b8e867ef5a575440f7497b00a3566bc6dd075e57
                                                    • Instruction ID: 9436d355419c66c3307a5d4815f0c0983f9a60718b6f420af6fe9f83e39015e2
                                                    • Opcode Fuzzy Hash: 0145596477e094336abc48c3b8e867ef5a575440f7497b00a3566bc6dd075e57
                                                    • Instruction Fuzzy Hash: 66A13830B1C2C68FDB01EBB5C8641ED7FE29F92294B9444BFC044DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: db6cbf484bf7f67c366b95c89047fb21990b6b1067e90caa921f1cdcdc567765
                                                    • Instruction ID: ba4d9ca135322d18dbb1a5c85383c893367f380540d536111a946e4434df06ba
                                                    • Opcode Fuzzy Hash: db6cbf484bf7f67c366b95c89047fb21990b6b1067e90caa921f1cdcdc567765
                                                    • Instruction Fuzzy Hash: CEA10530B1C2C68FDB01EBB5C8640ED7FE29F9219479845BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 341e175a784561df1fda34faab981973f68969905722c81f7aab07b2ae5a5040
                                                    • Instruction ID: ff525dbf11709347498a1ee1b8e3945708e5c15da6d6bbc462520eded05c7d17
                                                    • Opcode Fuzzy Hash: 341e175a784561df1fda34faab981973f68969905722c81f7aab07b2ae5a5040
                                                    • Instruction Fuzzy Hash: 72A11730B5C2C68FDB01EBB5C8640ED7FE29F92294B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c70dea638cc4193af03dc336429588b2ef0d5cc39fd4f2b4cd91a28febae29c8
                                                    • Instruction ID: 7787285843734e2e6384ea563e44a30ffd02967938560d899d4b284cbcb69e33
                                                    • Opcode Fuzzy Hash: c70dea638cc4193af03dc336429588b2ef0d5cc39fd4f2b4cd91a28febae29c8
                                                    • Instruction Fuzzy Hash: 8BA11730B1C2C68FDB01EBB5C8640ED7FE29F92294B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2faef8f2c3894a6988184737706e8503a5dd21ca8cc238759a7ea4fde121d7bb
                                                    • Instruction ID: 7fce706f8d99e8d8ae87fb65a6001f953d9ac0cb3230ca378bb016e8db04d7de
                                                    • Opcode Fuzzy Hash: 2faef8f2c3894a6988184737706e8503a5dd21ca8cc238759a7ea4fde121d7bb
                                                    • Instruction Fuzzy Hash: ECA10730B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9eb72b0a920aab0ff2525b6ff9b131007b1318c00cb39188b0b3a8314eafc50c
                                                    • Instruction ID: 7765b4536af403c5daa40dab9748c8f8f9f79f06aea746b6537b5cd79f48d420
                                                    • Opcode Fuzzy Hash: 9eb72b0a920aab0ff2525b6ff9b131007b1318c00cb39188b0b3a8314eafc50c
                                                    • Instruction Fuzzy Hash: AFA12A30B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a5c5d842c5baa6872f329e2de1c496e0909c15408850e74dd2f2b16a5c3962ce
                                                    • Instruction ID: dc61abaec6b1336103475c34db2f9c9b0814ef5df9821a6b04805350688fa71b
                                                    • Opcode Fuzzy Hash: a5c5d842c5baa6872f329e2de1c496e0909c15408850e74dd2f2b16a5c3962ce
                                                    • Instruction Fuzzy Hash: 0BA13830B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB196EABD8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c6ebc4e06ff0971b78a07035fd81822717dafa6327d6e5a19b4a91e3904c84a0
                                                    • Instruction ID: c8d0e0f0a39954e37f8ae97cf1ff82a855031408f1ba59eb9120c5cbc907abb5
                                                    • Opcode Fuzzy Hash: c6ebc4e06ff0971b78a07035fd81822717dafa6327d6e5a19b4a91e3904c84a0
                                                    • Instruction Fuzzy Hash: 79A12830B1C2C68FDB01EBB5C8641ED7FE29F92194B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 268f9777a87c6e869ae55403e823873878301d79f3f1c2759eaedce0a87e5819
                                                    • Instruction ID: d8c59961c3390bbcb1f87d57f68e43b262b348f387401b24c000bdd1f4381951
                                                    • Opcode Fuzzy Hash: 268f9777a87c6e869ae55403e823873878301d79f3f1c2759eaedce0a87e5819
                                                    • Instruction Fuzzy Hash: BBA13830B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC041DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8b4a4006ac41fab4a8a08709c43af64033ab11c8b88a6c754020ce62ae659ae3
                                                    • Instruction ID: d129e7f722999833e0bf2e8a5ddec0f1d0d1c4d2fe5c712c7f0ed26af0ffd84f
                                                    • Opcode Fuzzy Hash: 8b4a4006ac41fab4a8a08709c43af64033ab11c8b88a6c754020ce62ae659ae3
                                                    • Instruction Fuzzy Hash: 46A12830B1C2C68FDB01EBB5C8641ED7FE29F92194B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 09d3ba4e68c3ca5e5b31911e7f9f2bf94228cd08e0a0ea086240d19df29a4f80
                                                    • Instruction ID: 596072576bc430067065f412c58f5620fe515b85c0b2a38a4069e07aff36b47b
                                                    • Opcode Fuzzy Hash: 09d3ba4e68c3ca5e5b31911e7f9f2bf94228cd08e0a0ea086240d19df29a4f80
                                                    • Instruction Fuzzy Hash: 0EA12630B1C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7b153ab80acc769600482c5dd01fcfd19f451a016c42d9a2fc004ea41cea6f5a
                                                    • Instruction ID: 81b1bde7ff839f0736feadf0147407e6093bc4e785bbdb722c7e7b4e2f527eb2
                                                    • Opcode Fuzzy Hash: 7b153ab80acc769600482c5dd01fcfd19f451a016c42d9a2fc004ea41cea6f5a
                                                    • Instruction Fuzzy Hash: EDA11830B1C2C68FDB01EBB5C8641ED7FE29F92194B9844BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0f5a8c606f8f555b610241115e6357e2c82fdd9e596c7f97d3253583d235d0e5
                                                    • Instruction ID: ea09778c1a77fe6b931c709051ad86f18fded8b628972cc696ec34c508d61b43
                                                    • Opcode Fuzzy Hash: 0f5a8c606f8f555b610241115e6357e2c82fdd9e596c7f97d3253583d235d0e5
                                                    • Instruction Fuzzy Hash: ECA11730B5C2C68FDB01EBB5C8640ED7FE29F9219479444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de84a24f22a25682be028556329f688df19ec275a4114acd3e0ba9f6ffdc26d4
                                                    • Instruction ID: f502b28b1e8fe9d8e12ba59f41ef275a4574e6ffedd2005594528b45cc9396a9
                                                    • Opcode Fuzzy Hash: de84a24f22a25682be028556329f688df19ec275a4114acd3e0ba9f6ffdc26d4
                                                    • Instruction Fuzzy Hash: BF912730B5C2C68FDB01EBB5C8640ED7FE29F92194B9844BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 64404d2a9f4e2cc7ce6bdd13b996bb6227b24a9df41148948221889615bffd60
                                                    • Instruction ID: eaaa43b9d5c02a5da74340e6d38329f6b54ea1c2945d8df1c4031e95e3022b81
                                                    • Opcode Fuzzy Hash: 64404d2a9f4e2cc7ce6bdd13b996bb6227b24a9df41148948221889615bffd60
                                                    • Instruction Fuzzy Hash: 1E912730B5C2C68FDB01EBB5C8641ED7FE29F92194B9444BFC041DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a090df15f1725f163f210162b0f3df214ff93fa799a409f39a8e0fe86f8bee3f
                                                    • Instruction ID: 140e7d958d1534426c1b8fff0c197fbe724bc8f1dca24675143e50ec89e595d9
                                                    • Opcode Fuzzy Hash: a090df15f1725f163f210162b0f3df214ff93fa799a409f39a8e0fe86f8bee3f
                                                    • Instruction Fuzzy Hash: 92911630B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB196EA6D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 983f67df3ebabf7c60b38545c9fe7417a4be65f953d9a9bd4739c2e6a54b79d7
                                                    • Instruction ID: 079545c17288aaf28142dab5dc582f83973520b942c6e67a77b7983132448262
                                                    • Opcode Fuzzy Hash: 983f67df3ebabf7c60b38545c9fe7417a4be65f953d9a9bd4739c2e6a54b79d7
                                                    • Instruction Fuzzy Hash: 49912630B5C2C68FDB01EBB5C8640ED7FE29F9219479844BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9d24fe7f11d51a2b5cd22cab39b8517d94c98bbfb3cb913b2c90713f451098b1
                                                    • Instruction ID: 099cded796c440d547f5db1367b27e75e70312cf89e046f6685457383c6f471b
                                                    • Opcode Fuzzy Hash: 9d24fe7f11d51a2b5cd22cab39b8517d94c98bbfb3cb913b2c90713f451098b1
                                                    • Instruction Fuzzy Hash: 69912730B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b6dd081820e326899741016aacc52dcbbf54e68c5a9db56cae75008db67a7d6e
                                                    • Instruction ID: a615ec79b728af2f697bf991945ff26fe43677794ea525e89657db201e6c9d85
                                                    • Opcode Fuzzy Hash: b6dd081820e326899741016aacc52dcbbf54e68c5a9db56cae75008db67a7d6e
                                                    • Instruction Fuzzy Hash: 6D911730B5C2C68FDB01EBB5C8640ED7FE29F9219479444BFC045DB196EA7D8986C782
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e513d668415d6d2f5d560c90815c17105804d81f286aa10da3d6394ffc3c971e
                                                    • Instruction ID: 246af079070e108b61d7f449116bb3ef0d2a29727ecc8e915b54054ad9a84ede
                                                    • Opcode Fuzzy Hash: e513d668415d6d2f5d560c90815c17105804d81f286aa10da3d6394ffc3c971e
                                                    • Instruction Fuzzy Hash: A5911630B5C2C68FDB01EBB5C8640ED7FE29F9219479444BFC045DB296EA6D8986C782
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5114ad51ee880f9cc95a8e8db5fe54e35756e13c1ec507913e6a43b0715e43ec
                                                    • Instruction ID: 39e19ba496a7cf288cafe67db181c85eebcf3d1fa38ed89f172d6b285b3e40c5
                                                    • Opcode Fuzzy Hash: 5114ad51ee880f9cc95a8e8db5fe54e35756e13c1ec507913e6a43b0715e43ec
                                                    • Instruction Fuzzy Hash: C3912730B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB296EE6D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ba26b6efeb864d38e1922a2220c1f20d9441de3650bc5e393bbd98c508dc0efb
                                                    • Instruction ID: 8dffe4fb24e5c51357badf5683c6595e8c27e00c9da0d8d72595dbed80c7e87f
                                                    • Opcode Fuzzy Hash: ba26b6efeb864d38e1922a2220c1f20d9441de3650bc5e393bbd98c508dc0efb
                                                    • Instruction Fuzzy Hash: 98910630B5C2C68FDB01EBB5C8640ED7FE29F9219479444BFC045DB296EE6D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2c96a7a7ae495a3d63053e0e7ee3c2df3414519adee55aaa972b61f51fde6559
                                                    • Instruction ID: 7968179051c1a5880bd5497d579c8b40f2f86c7832fa80c4460f3cb04da58025
                                                    • Opcode Fuzzy Hash: 2c96a7a7ae495a3d63053e0e7ee3c2df3414519adee55aaa972b61f51fde6559
                                                    • Instruction Fuzzy Hash: 71911630B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: aac3c1ec48558a8a73f6b88c067cb0d42844de63fe4bbdab8f2730f48a362ded
                                                    • Instruction ID: 7d4708a86f13fdd47f0194e1663eb0b1753faa7f32c3a0644560ecd59abc062a
                                                    • Opcode Fuzzy Hash: aac3c1ec48558a8a73f6b88c067cb0d42844de63fe4bbdab8f2730f48a362ded
                                                    • Instruction Fuzzy Hash: F3911630B5C2C68FDB01EBB5C8640ED7FE29F9219479844BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a8d65617216398cab7ebc54ddc0312ddd9bb1b3fb125d0e40e42553d55bdfc86
                                                    • Instruction ID: 9adb5809e78d77f4cb3d9154a114486bc37661242627a125c48a7fae8d7f71c6
                                                    • Opcode Fuzzy Hash: a8d65617216398cab7ebc54ddc0312ddd9bb1b3fb125d0e40e42553d55bdfc86
                                                    • Instruction Fuzzy Hash: C2911730B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e49cba83ada27db5d5a161e4af3dbfa8d048b7f0d19f6675c6bfbfdabf791302
                                                    • Instruction ID: 047a02673c91d60d51f1b7bb2d7bfa9c38ee5cf2cc7d7ddbaf17726bbd276b74
                                                    • Opcode Fuzzy Hash: e49cba83ada27db5d5a161e4af3dbfa8d048b7f0d19f6675c6bfbfdabf791302
                                                    • Instruction Fuzzy Hash: 9E912730B5C2C68FDB01EBB5C8640ED7FE29F9219479444BFC045DB296EABD8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 41649a25d66d8e793faf33ff80a11104e22978c8e538fd4198c53e4b7aa6a7e5
                                                    • Instruction ID: f689d49d43d5ba6be41f28ba4d44ab3561d61b56b1da556e41c8af06c6c4cd94
                                                    • Opcode Fuzzy Hash: 41649a25d66d8e793faf33ff80a11104e22978c8e538fd4198c53e4b7aa6a7e5
                                                    • Instruction Fuzzy Hash: AF911730B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB296EA6D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 129dc46592a36bd3c4fa1db7ad97e20235f7a123fa61d5892cdc970c2481845f
                                                    • Instruction ID: 09eb9ac3f73e8e381e6ff6a9bac718cc6fa84394ef0c87ab952ba0a77cdfca2e
                                                    • Opcode Fuzzy Hash: 129dc46592a36bd3c4fa1db7ad97e20235f7a123fa61d5892cdc970c2481845f
                                                    • Instruction Fuzzy Hash: CD912630B1C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB196EAAD8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c476d3e5988d7d6fe90d4181c82a75bd16f7307e42b657d3fe99d39d656445a7
                                                    • Instruction ID: cb5dcf455a4d87ddeda73a8dba0c9503fbefc6f741901b6ca63f02d5b640b162
                                                    • Opcode Fuzzy Hash: c476d3e5988d7d6fe90d4181c82a75bd16f7307e42b657d3fe99d39d656445a7
                                                    • Instruction Fuzzy Hash: 07912630B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB296EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d03d048f97fe0b538c3c9ef1f4275e6d9beeb00014c4d6231521f7a8de76799b
                                                    • Instruction ID: d4b6bbcf550fca9f6606bed15afc91e8486c86d17e690b8ec44377eb87fc9445
                                                    • Opcode Fuzzy Hash: d03d048f97fe0b538c3c9ef1f4275e6d9beeb00014c4d6231521f7a8de76799b
                                                    • Instruction Fuzzy Hash: 60911530B5C2C68FDB01EBB5C8640ED7FE29F9219479444BFC045DB296EA6D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0125df51b35ff036dc8b23c188c3cd54966a1d1014c3df538ce5bd7f729be9a4
                                                    • Instruction ID: 5c40b7a21f8ec958d79183356e9b8c6741a0cdac29546bc4b24eb4c2b80724b8
                                                    • Opcode Fuzzy Hash: 0125df51b35ff036dc8b23c188c3cd54966a1d1014c3df538ce5bd7f729be9a4
                                                    • Instruction Fuzzy Hash: BA911730B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB296EE6D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f2dda332164b32e442bda2f559212363b9f0213bc17507fb0996a31029d6a264
                                                    • Instruction ID: 3767af4d76055c78d0db3cc639e438628a3f51609364575bc3eeb80ce03194aa
                                                    • Opcode Fuzzy Hash: f2dda332164b32e442bda2f559212363b9f0213bc17507fb0996a31029d6a264
                                                    • Instruction Fuzzy Hash: E8911730B5C2C68FDB01EBB5C8640ED7FE29F92194B9444BFC045DB196EA7D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5c0a5404403aeeea80b3212347853e92ba6118d47aaa412df3f116a68d02655c
                                                    • Instruction ID: 584bdd72f09ceda74510ac2e0a5c63ef4060d7b666e2d6c84167ff8677f4cca6
                                                    • Opcode Fuzzy Hash: 5c0a5404403aeeea80b3212347853e92ba6118d47aaa412df3f116a68d02655c
                                                    • Instruction Fuzzy Hash: EC912730B5C2C68FDB01EBB5C8640ED7FE29F9219479444BFC041DB296EA6D8986C742
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e0c2825d534f85dcbb1efb4ebbefa25c893445e8758b423f072d3d74c74e03eb
                                                    • Instruction ID: d4d149b691303cd99d9b86bf1a21356e3973267ad750dea0c55aba2524f6dab4
                                                    • Opcode Fuzzy Hash: e0c2825d534f85dcbb1efb4ebbefa25c893445e8758b423f072d3d74c74e03eb
                                                    • Instruction Fuzzy Hash: B6911630B5C2C68FDB01EBB5C8640ED7FE29F9219479844BFC045DB196EA6D8986C782
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 78fd7054491dcce880f09d0fe88850d9cf92ec3eb13b50134c00f7c225a93882
                                                    • Instruction ID: 1a06c07b233910d27c04e3f4ca8c858a70afbfdff4e63e4d066b3abd43c5cda2
                                                    • Opcode Fuzzy Hash: 78fd7054491dcce880f09d0fe88850d9cf92ec3eb13b50134c00f7c225a93882
                                                    • Instruction Fuzzy Hash: 66818F31B101198FCB08DBB8D9946ADB7E6EFC8304B254479E60AEB360DF31DC458B92
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5537d2dc0d49d9508c7895ca93c36647f6a3e7b833d23b6c2e8fff671cf05664
                                                    • Instruction ID: 90499b24df1bf73f15d5285b93fedaae704a05dc08a870d7232255c7ee2377ec
                                                    • Opcode Fuzzy Hash: 5537d2dc0d49d9508c7895ca93c36647f6a3e7b833d23b6c2e8fff671cf05664
                                                    • Instruction Fuzzy Hash: 57818D31B101098FCB48DB78D994AADB7E6FFC8304B25447AE60AEB360DB71DC458B42
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e6e46a69857e113ecbc00b430c5395b7f99cd4ca6401e4fd44cbdf115326540a
                                                    • Instruction ID: 7cc5a787509e39ed2b92fb5d6d44e09b8f3a3717fd583a9cc38be0bc6940e3fa
                                                    • Opcode Fuzzy Hash: e6e46a69857e113ecbc00b430c5395b7f99cd4ca6401e4fd44cbdf115326540a
                                                    • Instruction Fuzzy Hash: 8071B670B101498FCB04EBB8D8915ADB7A7EFD8304B149439E61AEB364EF34DD168B51
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d2e679cfd51ca455d66237133d4e38b83962d066deef585036d30897e2f9dd40
                                                    • Instruction ID: a31f6d11b6676c56d4e692ac4442466458935a501f9d6633ddc34424d64b8419
                                                    • Opcode Fuzzy Hash: d2e679cfd51ca455d66237133d4e38b83962d066deef585036d30897e2f9dd40
                                                    • Instruction Fuzzy Hash: AE51E170A11214CFDF54DB78D5612AEB6EAAF88214F24487AE086DB358DF31CD41DB92
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 67eff3d1452052ba8d335d521f43083a8ec79ed3484c9ee18797a7f479e76e36
                                                    • Instruction ID: 82b37fc7fa4ba40c4cde250e7632b07ecb98ee7e473f20c42ceb871edfe9b708
                                                    • Opcode Fuzzy Hash: 67eff3d1452052ba8d335d521f43083a8ec79ed3484c9ee18797a7f479e76e36
                                                    • Instruction Fuzzy Hash: E741F531F002598FCB84CBB89A511ADB7E2ABD9304714E43BD60AEB350EE74DC16CB91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 48f605611b2c2cd090344d5543fd4dd7782a68c8b93ea9b14272f8365ff8c877
                                                    • Instruction ID: 36503ff7911abde77f000d3f41a0967db2cc210bf9fdb5914a65628ee0c58255
                                                    • Opcode Fuzzy Hash: 48f605611b2c2cd090344d5543fd4dd7782a68c8b93ea9b14272f8365ff8c877
                                                    • Instruction Fuzzy Hash: B50267B4A401288FCBA0DF64DD8469AF7F2FB88325F1082E6A90DA7350DB315E94DF55
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: fcac3303a3a7e26cd6928098e35a60e715878939ae74bee1783373d317db4f9d
                                                    • Instruction ID: 327d1f9d089ba54cd01cc58acbf4444e91941aac73931ad4ba38916f17338a24
                                                    • Opcode Fuzzy Hash: fcac3303a3a7e26cd6928098e35a60e715878939ae74bee1783373d317db4f9d
                                                    • Instruction Fuzzy Hash: A2F167B4A401288FCBA0DF64DD8469AF7F2FB88325F1082E6A90DA7350DB315E94DF55
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: d5c7cb1de3189cf283e9462529e57ffb8101102052d1987c21bbf51436c6ca22
                                                    • Instruction ID: 316e150cdbdcc322a9c4a9b4554bc59594fb1e2dd3d677642013173bb9cf4848
                                                    • Opcode Fuzzy Hash: d5c7cb1de3189cf283e9462529e57ffb8101102052d1987c21bbf51436c6ca22
                                                    • Instruction Fuzzy Hash: A0F177B4A401288FCBA0DF64DD8469AF7F2FB88325F1082E6A90DA7350DB315E94DF55
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: bc7dfc1f9c2e61a19726965fa4ec55de05f6662723818eaae9dccda4bbacfc35
                                                    • Instruction ID: 7c97171a06a9e8a4a1e03237a448221d0493060de43210b0a1af2125413a4f04
                                                    • Opcode Fuzzy Hash: bc7dfc1f9c2e61a19726965fa4ec55de05f6662723818eaae9dccda4bbacfc35
                                                    • Instruction Fuzzy Hash: EDF177B4A401288FCBA0DF64DD8469AF7F2FB88325F1082E6A90DA7350DB315E94DF55
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: c006e85c34fe42759e0c4e4a7fb0bfa3a011e900ce64f03eefd20fb519a0bc30
                                                    • Instruction ID: 0994eab53430eeeef2c13ab79fb1f6a727d679764be4c7f27288cc02bbec8981
                                                    • Opcode Fuzzy Hash: c006e85c34fe42759e0c4e4a7fb0bfa3a011e900ce64f03eefd20fb519a0bc30
                                                    • Instruction Fuzzy Hash: 03E177B4A401288FCBA0DF64DD8469AF7F2FB88325F1082E6A90DA7350DB315E94DF55
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 4439cb3af6b989d8ba03792d21e3d235c766ce7af0dc8accc5e85ead6bfa98c7
                                                    • Instruction ID: ecc3ca209d5f576a39b1e6932413e55dbd67e7973483883b875f0ce0304054ac
                                                    • Opcode Fuzzy Hash: 4439cb3af6b989d8ba03792d21e3d235c766ce7af0dc8accc5e85ead6bfa98c7
                                                    • Instruction Fuzzy Hash: 25E177B4A401288FCBA0DF64DD8469AF7F2FB88325F1082E6A90DA7350DB315E94DF55
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: e9eaf2c329fa1f2a0755f2bf1d485517acb65f495f060d3c5f5452a895c724b0
                                                    • Instruction ID: e9d724e1d3c1eeb5f137a08340ae701f21322e63b39522dfaf0d76fcd3978cda
                                                    • Opcode Fuzzy Hash: e9eaf2c329fa1f2a0755f2bf1d485517acb65f495f060d3c5f5452a895c724b0
                                                    • Instruction Fuzzy Hash: 82E187B4A501288FCBA0DF64DD8469AF7F2FB88325F1082E6A90DA7350DB315E94DF15
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 5a31eac51c23c8da05bfd36a45921b8406cbe96f58e68c59122e49833f71a18b
                                                    • Instruction ID: bd9da2421a0a35b3b9b032f66cefa11eee425d984ddf78205f9780bc64424e08
                                                    • Opcode Fuzzy Hash: 5a31eac51c23c8da05bfd36a45921b8406cbe96f58e68c59122e49833f71a18b
                                                    • Instruction Fuzzy Hash: C2D187B4A501288FCBA0DF64DD8469AF7F2FB88325F1082E6A90DA7350DB315E94DF15
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 007a63048a2b54b6b84c2cc0492c42a39f357f567dde6435b6f378f78fca1d2c
                                                    • Instruction ID: 1cf3253ef33da22a0261a6bf4825dac4fb3c13dface4ad26ac30118ad8169b49
                                                    • Opcode Fuzzy Hash: 007a63048a2b54b6b84c2cc0492c42a39f357f567dde6435b6f378f78fca1d2c
                                                    • Instruction Fuzzy Hash: AFD177B4A501288FCBA0DF64DD8469AF7F2FB88325F1082E6990DA7350DB315E94DF15
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 7647808c0e5489410428d8e4d48693071a6e98526488326cba7a7a59368cdd52
                                                    • Instruction ID: 9bf1250353e410bb541d8d17771e27f901ac0555501a79715ca6a2c4469c579c
                                                    • Opcode Fuzzy Hash: 7647808c0e5489410428d8e4d48693071a6e98526488326cba7a7a59368cdd52
                                                    • Instruction Fuzzy Hash: A3C176B4A501288FCBA0DF64DD8469AF7F2FB88325F1082E6990DA7350DB319E94DF11
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: bc88ce6181edb259da5b34f6ae07c0da2a1f8eacaafb30a33ed22f726c6be8ad
                                                    • Instruction ID: 76a927b19ef1f25bed1990c3bea72a4fbae29952f6378b61dfe87386e33688ba
                                                    • Opcode Fuzzy Hash: bc88ce6181edb259da5b34f6ae07c0da2a1f8eacaafb30a33ed22f726c6be8ad
                                                    • Instruction Fuzzy Hash: 30C187B4A502288FCBA0DF64DD8479AB7F2FB88325F1082E6990DA7350DB315E94DF11
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 56c7dba2fc489d4efe49fe1706681200c9aa3a74cd8da87eecaa41ed311a7023
                                                    • Instruction ID: bed1478e0b02a88821ffd041b7c2a5145d8a0671092785a46c44e917bcd2c82e
                                                    • Opcode Fuzzy Hash: 56c7dba2fc489d4efe49fe1706681200c9aa3a74cd8da87eecaa41ed311a7023
                                                    • Instruction Fuzzy Hash: A5B196B4A501288FCBA0CF64DD8469AB7F2FB89325F1082E6990DA7350DB319E94DF51
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: dff7e82c27ae51313b8ce4e7eed132579be058da4f618d6a6dd4647ead5364be
                                                    • Instruction ID: 0053fdf7cf86e3cfa0d4fcc2c97ab146e732c185895962e68026560b675a3f3d
                                                    • Opcode Fuzzy Hash: dff7e82c27ae51313b8ce4e7eed132579be058da4f618d6a6dd4647ead5364be
                                                    • Instruction Fuzzy Hash: E6B197B4E501288FCBA0DF64DD8469AB7F2FB88325F1082E6990DA7350DB319E94DF11
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 34b6f990f4cb34e03552c58a9eb6059f2019ba66f90ef7172e938bceb3d67013
                                                    • Instruction ID: 0ee33637a30881b608cb2dee05be7443a18cd76c00b69904e3d70584475807f2
                                                    • Opcode Fuzzy Hash: 34b6f990f4cb34e03552c58a9eb6059f2019ba66f90ef7172e938bceb3d67013
                                                    • Instruction Fuzzy Hash: 53A196B4A501288FCBA4CF64DD8479AB7F2FB89325F1082E6990DA7350DB319E94DF11
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 44c6805e67be64daa0c40dc63e29bd804a8c27217548372d691377ac9ef82a71
                                                    • Instruction ID: 5465a0e6a3602cd9cc49599a242b407fa3e91748e8d4c34193510e48464b1523
                                                    • Opcode Fuzzy Hash: 44c6805e67be64daa0c40dc63e29bd804a8c27217548372d691377ac9ef82a71
                                                    • Instruction Fuzzy Hash: 0991A6B4E501688FCBA0CF68DD8469AB7F2FB89315F1082E6990DA7350DB319E94DF11
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F01FE3
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID: X
                                                    • API String ID: 6842923-3587144104
                                                    • Opcode ID: 77418fff6cbcef0ef1c8c20ffa8c052e660619dfa213f2ffafff1522fbffaac5
                                                    • Instruction ID: e2707bb86f2db8ebc681f1ff132033a2c98ad505902f0f356a33d619a36a52d1
                                                    • Opcode Fuzzy Hash: 77418fff6cbcef0ef1c8c20ffa8c052e660619dfa213f2ffafff1522fbffaac5
                                                    • Instruction Fuzzy Hash: 7391B7B4E102688FCBA0CF64DD8469AB7F2FB89315F1082E6990DA7350DB319E949F11
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F024A6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 33095ff2a33de4659b9c69c6fa56c0df678f85e99eb1dcbf45404b75f0f7f4a3
                                                    • Instruction ID: 541dacdba04d8912571f864ec95b48134b01b5d363edda945f1fdd0be0b0d798
                                                    • Opcode Fuzzy Hash: 33095ff2a33de4659b9c69c6fa56c0df678f85e99eb1dcbf45404b75f0f7f4a3
                                                    • Instruction Fuzzy Hash: 7151E8B4E402288FCBA4CF24DD8479AB7F2FB89315F1082E69909A7350DB319E95DF11
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 10426 efb5f8-efb65f 10432 efb666-efb668 10426->10432 10433 efb8ae-efb8b8 10432->10433 10434 efb66e-efb6e7 10432->10434 10442 efb6ed-efb72c 10434->10442 10443 efb896-efb8ac 10434->10443 10450 efb732 10442->10450 10451 efb881-efb890 10442->10451 10443->10433 10452 efb737-efb74c 10450->10452 10451->10442 10451->10443 10452->10451 10453 efb752 10452->10453 10453->10450 10453->10451 10455 efb759-efb7b4 10453->10455 10456 efb7b6-efb7ff 10453->10456 10457 efb804-efb82a 10453->10457 10455->10452 10456->10452 10464 efb82c-efb833 10457->10464 10465 efb83b-efb86b 10457->10465 10464->10465 10465->10452
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: l-:$l-:
                                                    • API String ID: 0-157468240
                                                    • Opcode ID: 3dc43e210059b7b615a7de55c0ebae76ba6a7116fe870a8f474fdb97169390f5
                                                    • Instruction ID: d9c66aeafd4524503245450953f69e8c143aeb7a0ec5b5d8353d22513d9912a6
                                                    • Opcode Fuzzy Hash: 3dc43e210059b7b615a7de55c0ebae76ba6a7116fe870a8f474fdb97169390f5
                                                    • Instruction Fuzzy Hash: 98716C30B102598BCB08EFB4C9946AEB7F2AFD5304B548539E505EB394EB74ED46CB80
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 10474 efb608-efb65f 10480 efb666-efb668 10474->10480 10481 efb8ae-efb8b8 10480->10481 10482 efb66e-efb6e7 10480->10482 10490 efb6ed-efb72c 10482->10490 10491 efb896-efb8ac 10482->10491 10498 efb732 10490->10498 10499 efb881-efb890 10490->10499 10491->10481 10500 efb737-efb74c 10498->10500 10499->10490 10499->10491 10500->10499 10501 efb752 10500->10501 10501->10498 10501->10499 10503 efb759-efb7b4 10501->10503 10504 efb7b6-efb7ff 10501->10504 10505 efb804-efb82a 10501->10505 10503->10500 10504->10500 10512 efb82c-efb833 10505->10512 10513 efb83b-efb86b 10505->10513 10512->10513 10513->10500
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: l-:$l-:
                                                    • API String ID: 0-157468240
                                                    • Opcode ID: 985e2fdeca379f494ce57c196a6a5ce9d784c42e95b18ee4f3788aaa67d448e9
                                                    • Instruction ID: ac5c36d62635256120ba4bdfe4ce59f04c903d87637ddf99c3c5daf171f56453
                                                    • Opcode Fuzzy Hash: 985e2fdeca379f494ce57c196a6a5ce9d784c42e95b18ee4f3788aaa67d448e9
                                                    • Instruction Fuzzy Hash: AE715D30B102598BCB08EFB4C9906AEB7F6AFD5304B548539E505AB394EF74ED46CB80
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 10522 ef00a0-ef0113 call f2e158 10531 ef011a-ef012c 10522->10531 10534 ef012f 10531->10534 10535 ef0134-ef0149 10534->10535 10536 ef014f 10535->10536 10537 ef021a-ef023e 10535->10537 10536->10534 10536->10537 10539 ef01cf-ef01da 10536->10539 10540 ef0156-ef0161 10536->10540 10541 ef01e6-ef01f3 10536->10541 10542 ef0285 10536->10542 10543 ef0163-ef019d 10536->10543 10544 ef0263-ef0283 10536->10544 10545 ef0240 10536->10545 10537->10542 10537->10545 10539->10541 10555 ef01dc-ef01e1 10539->10555 10540->10535 10553 ef020d-ef0215 10541->10553 10554 ef01f5-ef01fb 10541->10554 10563 ef019f-ef01a3 10543->10563 10564 ef01aa-ef01ca 10543->10564 10546 ef0245-ef025a 10544->10546 10545->10546 10546->10542 10551 ef025c 10546->10551 10551->10542 10551->10544 10551->10545 10553->10535 10557 ef01ff-ef020b 10554->10557 10558 ef01fd 10554->10558 10555->10535 10557->10553 10558->10553 10563->10564 10564->10535
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: q1n$ q1n
                                                    • API String ID: 0-2516560063
                                                    • Opcode ID: f3b4d59c3674ac3d5beb32b331c01f472c0dd7fec3c90ea084ba132fa898b055
                                                    • Instruction ID: 23691ca0a370e07e36bf10cf1d79e3a54ec74a9dae8112122b06f75bd774a33a
                                                    • Opcode Fuzzy Hash: f3b4d59c3674ac3d5beb32b331c01f472c0dd7fec3c90ea084ba132fa898b055
                                                    • Instruction Fuzzy Hash: 7C418F30B112188FDB58DBB8C8546AEB6E7AFD9304B24983AD506EB791DF34DC05CB91
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: f4ee69b61e070d136d4e41346270996bd0020e4016ac98507928e80cdb4b16fb
                                                    • Instruction ID: 0be1065142beb597686f9fd70459f907d5c0bc1d3aa570be0023b8d5886308d9
                                                    • Opcode Fuzzy Hash: f4ee69b61e070d136d4e41346270996bd0020e4016ac98507928e80cdb4b16fb
                                                    • Instruction Fuzzy Hash: 0481B8B4E502688FCBA0CF68DD84699B7F2FB89315F1082E6980DA7350DB319E94DF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 199fd13f88eb7c2de8efa19b75cee38aec15e2d28d6123c3f3071054bbae3bda
                                                    • Instruction ID: ca55c925fb5ba92f1e50887e1bdb8e4ed68ba4f41bb041fad6adc680f7f84773
                                                    • Opcode Fuzzy Hash: 199fd13f88eb7c2de8efa19b75cee38aec15e2d28d6123c3f3071054bbae3bda
                                                    • Instruction Fuzzy Hash: 6071C8B4E102288FCBA0CF28DD84699B7F2FB89315F1082E6990DA7350DB319E94DF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: e19bd8c0bad10439e5a4a4f568dce20afe186eb11bedfc5d5cedee3bc0120761
                                                    • Instruction ID: 0694076ca73026e5936df3d07b871d79b3bafbf232782ddb58afebc9238485f6
                                                    • Opcode Fuzzy Hash: e19bd8c0bad10439e5a4a4f568dce20afe186eb11bedfc5d5cedee3bc0120761
                                                    • Instruction Fuzzy Hash: 2E61D9B4E102288FCBA4CF68DD84699B7F2FB89315F1082E6980DA7350DB319E94DF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 5dd2afeff30267fc6b40736204e02aa4e0c54ef98300cdba50072ece8c37e439
                                                    • Instruction ID: 329cf52553ea8717eaac731af1d61701df617cebe0711946e0a9be0cbdbb1692
                                                    • Opcode Fuzzy Hash: 5dd2afeff30267fc6b40736204e02aa4e0c54ef98300cdba50072ece8c37e439
                                                    • Instruction Fuzzy Hash: 7C51E8B4E502288FCBA4CF68DD84699B7F2FB89315F1082E6980DA7350DB319E95DF11
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 15b3096fb68cc46cfafe9be1860f03ce06fdbbff5ff57a0f855f6e3ae8f3c903
                                                    • Instruction ID: c390b72d6fd63b3f4d4eb366981a4fd7c9ca666629cff137a41d1cee1b805e59
                                                    • Opcode Fuzzy Hash: 15b3096fb68cc46cfafe9be1860f03ce06fdbbff5ff57a0f855f6e3ae8f3c903
                                                    • Instruction Fuzzy Hash: B951DBB4E102288FCBA4CF64DD84699B7F2FB89315F1082E6980DA7350DB319E95DF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: e8ae2cbddf1b1ee92e802056c0a4f75477852186a6b98c3d12571dd57465da5f
                                                    • Instruction ID: 9e10b33d3ebbf10874636b61c1f99b974c58dafc97dcb5ae49d712eb378f8e0a
                                                    • Opcode Fuzzy Hash: e8ae2cbddf1b1ee92e802056c0a4f75477852186a6b98c3d12571dd57465da5f
                                                    • Instruction Fuzzy Hash: 2751DAB4E102288FCBA4CF64DD84699B7F2FB89315F1082E6980DA7350DB319E95DF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: cce68f2e35114292a078572d77c6bfe320474c0fff71d525cc9d037efcafa73d
                                                    • Instruction ID: 45c56e7c6ea2c50bfa0c6489f41dcd6fe3ceba8b6ec7bb8adc3d6069550463cb
                                                    • Opcode Fuzzy Hash: cce68f2e35114292a078572d77c6bfe320474c0fff71d525cc9d037efcafa73d
                                                    • Instruction Fuzzy Hash: 1351E8B4E502288FCBA4CF68DD84699B7F2FB89315F1082E6980DA7350DB319E94DF11
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 6ee6d8ab423451ac934b59fd6e012d6d62232b3c66a81cea968b1d82df87504a
                                                    • Instruction ID: be0f3d1d6ee6e6d5434fa2c942d5195e1d4fca4d44b66d7a6c36db1c5e107931
                                                    • Opcode Fuzzy Hash: 6ee6d8ab423451ac934b59fd6e012d6d62232b3c66a81cea968b1d82df87504a
                                                    • Instruction Fuzzy Hash: A751DAB4E102288FCBA4CF64DD84699B7F2FB89315F1082E6980DA7350DB319E95DF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 2dbbdd32cd6c6b00da9eb7b70f62d83762c47dab0b96c19d8276f62e3c8ce9ff
                                                    • Instruction ID: 5aa2576550e752988983c4f37c8b3ee528d9660e8b0e4ab0524667185c7db869
                                                    • Opcode Fuzzy Hash: 2dbbdd32cd6c6b00da9eb7b70f62d83762c47dab0b96c19d8276f62e3c8ce9ff
                                                    • Instruction Fuzzy Hash: 3E51E9B4E102688FCBA4CF64DD8469AB7F2FB89315F1082E6980DA7350DB319E94DF11
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 465cdf6d7bb2965562cb1519d0da8bb297c83040ac59e27a07bda64beb49dbcf
                                                    • Instruction ID: b179fdf061b623c90c1b4da88a958fca7d5ca2f7ad3c7501b88ec1bbbcf41406
                                                    • Opcode Fuzzy Hash: 465cdf6d7bb2965562cb1519d0da8bb297c83040ac59e27a07bda64beb49dbcf
                                                    • Instruction Fuzzy Hash: 1151C8B4E102288FCBA4CF28DD84699B7F2FB89315F1082E6980DA7350DB319E95DF51
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 86d5a06e08b313f9f46e4496d69b4064518bbae8a31663cd48745e5d88227657
                                                    • Instruction ID: cf90c1f4daefc7455ee39e862051a33c8fd71814b5c607226df14e12d0f40fca
                                                    • Opcode Fuzzy Hash: 86d5a06e08b313f9f46e4496d69b4064518bbae8a31663cd48745e5d88227657
                                                    • Instruction Fuzzy Hash: 6E51D8B4E502288FDBA4CF28DD84699B7F2FB89315F1082E6980DA7350DB319E95DF11
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    APIs
                                                    • KiUserExceptionDispatcher.NTDLL ref: 00F023DC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594159167.00F00000.00000040.00000001.sdmp, Offset: 00F00000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_f00000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DispatcherExceptionUser
                                                    • String ID:
                                                    • API String ID: 6842923-0
                                                    • Opcode ID: 067c91abbd1acc14149e6487d5ecee3b28bd212f3743ad39484d1e96777d913f
                                                    • Instruction ID: 47f26941e40faf0addc624abce54555f2130c4111d4bcbd7011d5b33663e8c79
                                                    • Opcode Fuzzy Hash: 067c91abbd1acc14149e6487d5ecee3b28bd212f3743ad39484d1e96777d913f
                                                    • Instruction Fuzzy Hash: A651EBB4E402688FCB94CF24DD8479AB7F2FB89315F1082E69909A7350DB319E95DF11
                                                    Uniqueness

                                                    Uniqueness Score: 0.06%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 13996 ed0a02-ed0ab2 14000 ed0ab4 13996->14000 14001 ed0ab7-ed0ac3 13996->14001 14000->14001 14002 ed0ac8-ed0ad1 14001->14002 14003 ed0ac5 14001->14003 14004 ed0ad3-ed0af7 CreateFileW 14002->14004 14005 ed0b22-ed0b27 14002->14005 14003->14002 14008 ed0b29-ed0b2e 14004->14008 14009 ed0af9-ed0b1f 14004->14009 14005->14004 14008->14009
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 00ED0AD9
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 8eca093640d237ae6a0a51413fab52c69e9fc07a0c945c04bdf30a3ab4ab2a7a
                                                    • Instruction ID: d5ef85e029809d3f71dfc76683a714d35731b7d7dedf45d155b4125c18d2fc01
                                                    • Opcode Fuzzy Hash: 8eca093640d237ae6a0a51413fab52c69e9fc07a0c945c04bdf30a3ab4ab2a7a
                                                    • Instruction Fuzzy Hash: AE4160715093806FE713CB65CC54B56BFB8EF47214F0944DBE984CB2A3D265A809CB72
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 14121 ed1911-ed193f 14123 ed1961-ed19d2 14121->14123 14124 ed1941-ed195e 14121->14124 14128 ed19d4-ed19dc WSASocketW 14123->14128 14129 ed1a23-ed1a28 14123->14129 14124->14123 14131 ed19e2-ed19f8 14128->14131 14129->14128 14132 ed1a2a-ed1a2f 14131->14132 14133 ed19fa-ed1a20 14131->14133 14132->14133
                                                    APIs
                                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 00ED19DA
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Socket
                                                    • String ID:
                                                    • API String ID: 38366605-0
                                                    • Opcode ID: 09e0eba3805dde8f84c15e438d3467c87fe940fe4df1a24d3b68971b1ed25796
                                                    • Instruction ID: ed9a38289e3f2945e3256f617f9f8568fcd746c4b6245802ba945ef3e10e40d9
                                                    • Opcode Fuzzy Hash: 09e0eba3805dde8f84c15e438d3467c87fe940fe4df1a24d3b68971b1ed25796
                                                    • Instruction Fuzzy Hash: 86417C7140E7C0AFD7128F618C55B96BFB4EF07214F0984DBE9858F2A3D325A909CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.66%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 14340 27ab72-27ac0d 14344 27ac12-27ac29 14340->14344 14345 27ac0f 14340->14345 14347 27ac6b-27ac70 14344->14347 14348 27ac2b-27ac3e RegOpenKeyExW 14344->14348 14345->14344 14347->14348 14349 27ac72-27ac77 14348->14349 14350 27ac40-27ac68 14348->14350 14349->14350
                                                    APIs
                                                    • RegOpenKeyExW.KERNEL32(?,00000E38), ref: 0027AC31
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: 23de9130cbc35c610bce6aa55936c342c08edd4fe18694c0e2c5e36f00b72e00
                                                    • Instruction ID: f5a51d661c20a3f46a08f6ff3e1cb25022a7109e8bc25ec66cb991a9fdbd0495
                                                    • Opcode Fuzzy Hash: 23de9130cbc35c610bce6aa55936c342c08edd4fe18694c0e2c5e36f00b72e00
                                                    • Instruction Fuzzy Hash: D931A2724093846FE712CB60DC45FABBFBCEF56220F08849BE9858B153D664A909CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 14355 ed27e3-ed28af 14361 ed2901-ed2906 14355->14361 14362 ed28b1-ed28b9 getaddrinfo 14355->14362 14361->14362 14364 ed28bf-ed28d1 14362->14364 14365 ed2908-ed290d 14364->14365 14366 ed28d3-ed28fe 14364->14366 14365->14366
                                                    APIs
                                                    • getaddrinfo.WS2_32(?,00000E38), ref: 00ED28B7
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: getaddrinfo
                                                    • String ID:
                                                    • API String ID: 300660673-0
                                                    • Opcode ID: c68f1349afb54334bb68fab607526f0eb542fc54875e9250f2332b136c47779c
                                                    • Instruction ID: 4f42f18b06c30e91e21d9ea0cdd974c949496424a55249946e8e79a8031c4e93
                                                    • Opcode Fuzzy Hash: c68f1349afb54334bb68fab607526f0eb542fc54875e9250f2332b136c47779c
                                                    • Instruction Fuzzy Hash: D031A172404344AFEB21CB60CC85FA7BBACEF46314F04499AFA849B182D775A949CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.62%

                                                    APIs
                                                    • CertGetCertificateChain.CRYPT32(?,00000E38,?,?), ref: 00ED2C56
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CertCertificateChain
                                                    • String ID:
                                                    • API String ID: 3019455780-0
                                                    • Opcode ID: 1312a2b3453dd5758267b9d28c42f8df01c51c5ddc04adb3cf345e3ed2ee0b97
                                                    • Instruction ID: 830fccd168f405c2bceaea6822d8253e321aa70061f62bf20e0baf4ef68bdc6b
                                                    • Opcode Fuzzy Hash: 1312a2b3453dd5758267b9d28c42f8df01c51c5ddc04adb3cf345e3ed2ee0b97
                                                    • Instruction Fuzzy Hash: 1B31907650D3C45FD7038B658C61AA2BFB4EF47614F0D84CBD8848F2A3D624A919C7A2
                                                    Uniqueness

                                                    Uniqueness Score: 16.53%

                                                    APIs
                                                    • WSAIoctl.WS2_32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2B49
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Ioctl
                                                    • String ID:
                                                    • API String ID: 3041054344-0
                                                    • Opcode ID: dad1778ccd8601c5c675b33c23f12808b45aa914925bbc3b99fbb75d73938614
                                                    • Instruction ID: 6fe4c86949fc8591ca3af97d63993712af33737db956ae94dd3f82d234cf44b2
                                                    • Opcode Fuzzy Hash: dad1778ccd8601c5c675b33c23f12808b45aa914925bbc3b99fbb75d73938614
                                                    • Instruction Fuzzy Hash: A3318F71005780AFEB22CF50CC44F96FFB8EF56314F08899BE9859B262D364E909CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.86%

                                                    APIs
                                                    • GetProcessTimes.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED25F9
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ProcessTimes
                                                    • String ID:
                                                    • API String ID: 1995159646-0
                                                    • Opcode ID: 104109bb2f460b620d3958b5726955d5c28d783a45eed005ebc3993dd58d5c65
                                                    • Instruction ID: 389a0b57b0b710c8ea29afcea111c63cf67f252775253e482eb982382010d946
                                                    • Opcode Fuzzy Hash: 104109bb2f460b620d3958b5726955d5c28d783a45eed005ebc3993dd58d5c65
                                                    • Instruction Fuzzy Hash: B4310972409380AFEB128F60DC45F96BFB8EF56314F0884DBE985DB193D2249505CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.67%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 0027AD34
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: d14f7bdedd83e7e674cf70867e577eb6f3a7f030ef29c911eea032a97efcb16c
                                                    • Instruction ID: 7deb42e7d77b249a39051c98a91428c7678b0768ccb60064e7e4e0a4cf98579f
                                                    • Opcode Fuzzy Hash: d14f7bdedd83e7e674cf70867e577eb6f3a7f030ef29c911eea032a97efcb16c
                                                    • Instruction Fuzzy Hash: 9431B6725097809FE722CF61CC45F96BFBCEF46720F08849AE949CB152D264E949CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED1CFC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 509653be9f0c34b894b9749203681d537db8d5b741942b61693f0ff2c5f999cf
                                                    • Instruction ID: 160069272973df63cf0b90e7285675265dd9af711c644572793cb1f4b851433d
                                                    • Opcode Fuzzy Hash: 509653be9f0c34b894b9749203681d537db8d5b741942b61693f0ff2c5f999cf
                                                    • Instruction Fuzzy Hash: 3431A2724097806FE722CB61CC44F96BFB8EF56314F0884DBE9859B293D264E909CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileView
                                                    • String ID:
                                                    • API String ID: 3314676101-0
                                                    • Opcode ID: db074e1655a9279455260fd6203c65d2e32b0548f21942ba05ed46a7dfbb5207
                                                    • Instruction ID: 5450e9a68ee1b8537eb0f745c02c57641e4d576141051471996c7fa9dced3f55
                                                    • Opcode Fuzzy Hash: db074e1655a9279455260fd6203c65d2e32b0548f21942ba05ed46a7dfbb5207
                                                    • Instruction Fuzzy Hash: 0F31C272009380AFE722CF60DC45F96FFF8EF16214F08449EE9848B252D365E949CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.53%

                                                    APIs
                                                    • K32EnumProcessModules.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2F8A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: EnumModulesProcess
                                                    • String ID:
                                                    • API String ID: 1082081703-0
                                                    • Opcode ID: c2b7538504b59d5fbb908a55f86655c642c0a8b557cc8ae854b466f973eadf3e
                                                    • Instruction ID: 59a187ca9a4ee3b10e765f112f9c045b06f7261ba9daae00b913ff1c6b2e989e
                                                    • Opcode Fuzzy Hash: c2b7538504b59d5fbb908a55f86655c642c0a8b557cc8ae854b466f973eadf3e
                                                    • Instruction Fuzzy Hash: C82106725093806FEB12CB60DC44B96BFB8EF57314F0884DBE984DF252D2249909C771
                                                    Uniqueness

                                                    Uniqueness Score: 0.70%

                                                    APIs
                                                    • CreateMutexW.KERNEL32(?,?), ref: 00ED233D
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateMutex
                                                    • String ID:
                                                    • API String ID: 1964310414-0
                                                    • Opcode ID: 7a96354e7febe46a3f14bf1408ad7ca01cedbac2ce5c3f25e1af3e24446246a7
                                                    • Instruction ID: ee1faab2c06759de70b20c194d382d3be4c51bf5c3d839d078ab7f9e3d2f9a92
                                                    • Opcode Fuzzy Hash: 7a96354e7febe46a3f14bf1408ad7ca01cedbac2ce5c3f25e1af3e24446246a7
                                                    • Instruction Fuzzy Hash: 953180B1509380AFE711CF65CC45F5AFFF8EF16214F0884AEE9449B292D365E908CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • getaddrinfo.WS2_32(?,00000E38), ref: 00ED28B7
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: getaddrinfo
                                                    • String ID:
                                                    • API String ID: 300660673-0
                                                    • Opcode ID: e0a8e0e807961e8a62776f4158c8d8c5adb3ab7c345fbecf87ab0b44889edc31
                                                    • Instruction ID: 0e65b3c3132a262e08cb20e9593f0efa2a8d7646d645edcb2437e457f36c65d8
                                                    • Opcode Fuzzy Hash: e0a8e0e807961e8a62776f4158c8d8c5adb3ab7c345fbecf87ab0b44889edc31
                                                    • Instruction Fuzzy Hash: 1321BF72500204AFEB20DF90CD85FABF7ACEF54314F10485AFA449A281E7B6E9498B71
                                                    Uniqueness

                                                    Uniqueness Score: 0.62%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED1400
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: eec0e8bf22648fb99b003ba2e5507d12d0d9e11720cc149c1ff300448a625a67
                                                    • Instruction ID: 8a72582edd8c00c8a1c7d967d9126c51d42bd584fa114762bd98bab34196016e
                                                    • Opcode Fuzzy Hash: eec0e8bf22648fb99b003ba2e5507d12d0d9e11720cc149c1ff300448a625a67
                                                    • Instruction Fuzzy Hash: 3F21AC72109380AFD7228F50CC44F96BFB8EF46210F08889BE985DB292D264E948CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • FindNextFileW.KERNELBASE(?,00000E38,?,?), ref: 0027A1C2
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileFindNext
                                                    • String ID:
                                                    • API String ID: 2029273394-0
                                                    • Opcode ID: 6e316151948bf61b611362ce5e3e60c384b9c97b7f6841a4cb551b7ada937e2b
                                                    • Instruction ID: 6e0e5d49813082e7f5e21cd3d4384c57c3fb79dc67adecc6b51616555f3d48e4
                                                    • Opcode Fuzzy Hash: 6e316151948bf61b611362ce5e3e60c384b9c97b7f6841a4cb551b7ada937e2b
                                                    • Instruction Fuzzy Hash: 2731B17140D3C06FD3128B658C55AA6BFB4EF47610F0985CBE8848F293D228A919CBA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    APIs
                                                    • RegOpenKeyExW.KERNEL32(?,00000E38), ref: 00ED12F6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: f87cd1e4c044c287fc8602beb6f4e4d433e36b4d3be5b77385a9b4ed8f589ebf
                                                    • Instruction ID: a02c7aae200b5885e04021297abeada8ea46b3601f3262e75f7862a824b92c77
                                                    • Opcode Fuzzy Hash: f87cd1e4c044c287fc8602beb6f4e4d433e36b4d3be5b77385a9b4ed8f589ebf
                                                    • Instruction Fuzzy Hash: 36219172505340AFEB21CB60DC45FABFFACEF45314F04849AF9449B252D264E909CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • K32GetModuleInformation.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED307A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: InformationModule
                                                    • String ID:
                                                    • API String ID: 3425974696-0
                                                    • Opcode ID: 439e33a9fa9b46be6674fa693d2861ae67e46df986300604a601b08094cc2198
                                                    • Instruction ID: f8d103cf39394dc870b85b868b897cdc7bc944bd133f6cfa8a10c537108ad565
                                                    • Opcode Fuzzy Hash: 439e33a9fa9b46be6674fa693d2861ae67e46df986300604a601b08094cc2198
                                                    • Instruction Fuzzy Hash: 9421B471505380AFE721CF60CC45FAABFBCEF56324F08849BE944DB252D664E949CB61
                                                    Uniqueness

                                                    Uniqueness Score: 2.12%

                                                    APIs
                                                    • K32GetModuleFileNameExW.KERNEL32(?,00000E38,?,?), ref: 00ED3186
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileModuleName
                                                    • String ID:
                                                    • API String ID: 514040917-0
                                                    • Opcode ID: 5ff764b1255dd360dd2622bb0db1b0b683bd0943467ba8edf83fbb5884fcdf92
                                                    • Instruction ID: 7d0e1fa0d7a5173bb4743c953e5f5d97d562a2f3907f314ebbe68fdcd2468a91
                                                    • Opcode Fuzzy Hash: 5ff764b1255dd360dd2622bb0db1b0b683bd0943467ba8edf83fbb5884fcdf92
                                                    • Instruction Fuzzy Hash: 0021B4715093C06FD712CB65CC55B66BFB8EF87214F0984DBE8848F293D624A919CBB2
                                                    Uniqueness

                                                    Uniqueness Score: 0.15%

                                                    APIs
                                                    • SHGetFolderPathW.SHELL32(?,00000E38,?,?), ref: 00ED08B6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FolderPath
                                                    • String ID:
                                                    • API String ID: 1514166925-0
                                                    • Opcode ID: 053b844371e10e2ddf87ab1fc5a4091fda1c0ae61b44c99981445c7f4c0ceec9
                                                    • Instruction ID: 1be3cb8f7527fc21c01e4cf8a27d41088a4bc9f4af9058647b7cfea9a16eb441
                                                    • Opcode Fuzzy Hash: 053b844371e10e2ddf87ab1fc5a4091fda1c0ae61b44c99981445c7f4c0ceec9
                                                    • Instruction Fuzzy Hash: 3821717540E3C05FD3138B758C55B56BFB4EF87610F1A81CBD8848F6A3D225A919C7A2
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,?,?), ref: 00ED174A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: a66e874e689ed18cbdc45b652f646a5e16d62c0878447c1ba09fc9c282588d88
                                                    • Instruction ID: 66dc269555102426d3f033ed02b8822962d0df45afbbc23424c019805a1be91a
                                                    • Opcode Fuzzy Hash: a66e874e689ed18cbdc45b652f646a5e16d62c0878447c1ba09fc9c282588d88
                                                    • Instruction Fuzzy Hash: D821B57550A3C06FD3138B259C51B62BF74EF87610F0981CBE8848F653D225A919C7B2
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • CertVerifyCertificateChainPolicy.CRYPT32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED3D52
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CertCertificateChainPolicyVerify
                                                    • String ID:
                                                    • API String ID: 3930008701-0
                                                    • Opcode ID: f47c7570a3de11d1debbaa995d6b01459e63852083f8d2e3fc40612be06b5997
                                                    • Instruction ID: 64df4f06327f27d9e7f1085817d3175ef5e84544089aea0fe05b397133008b43
                                                    • Opcode Fuzzy Hash: f47c7570a3de11d1debbaa995d6b01459e63852083f8d2e3fc40612be06b5997
                                                    • Instruction Fuzzy Hash: BA21B572105380AFEB11CF60DC45FA6FFB8EF46314F08849BE9449B252D264E545CB71
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • RegEnumKeyExW.KERNEL32(?,00000E38,?,?), ref: 00ED1236
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Enum
                                                    • String ID:
                                                    • API String ID: 2928410991-0
                                                    • Opcode ID: 61caa6d942c78acd0f417c5b4d5d0e87e15ce1e274a212756a3f3ae2ac9d35a6
                                                    • Instruction ID: f4abd87f87ae4710f99e3108534f3c53262bd51fa45194d21a35e526b2b4fcc7
                                                    • Opcode Fuzzy Hash: 61caa6d942c78acd0f417c5b4d5d0e87e15ce1e274a212756a3f3ae2ac9d35a6
                                                    • Instruction Fuzzy Hash: AD219F6540E3C06FC3138B768C65A11BFB4EF87610F1D80CFD8848F6A3D225A919C7A2
                                                    Uniqueness

                                                    Uniqueness Score: 0.05%

                                                    APIs
                                                    • OpenFileMappingW.KERNELBASE(?,?), ref: 00ED1F91
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileMappingOpen
                                                    • String ID:
                                                    • API String ID: 1680863896-0
                                                    • Opcode ID: e8e932fb3dbcee6ceef4606159dca86a1c8530de10b4466eb47326b2ae832472
                                                    • Instruction ID: 5dd673d69a9e66dd447775aadf01903826536b70c927aef8a53a8fffcef7c4e3
                                                    • Opcode Fuzzy Hash: e8e932fb3dbcee6ceef4606159dca86a1c8530de10b4466eb47326b2ae832472
                                                    • Instruction Fuzzy Hash: 6C2191B25093806FE711CB65CC45F66FFA8EF46214F0884AAE9449B342D375E904CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.68%

                                                    APIs
                                                    • CreateFileW.KERNEL32(?,?,?,?,?,?), ref: 00ED0AD9
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 380fc3bfba7100691831687386ae16cfecec457c2c70292cecb050cb97cb13ad
                                                    • Instruction ID: b260fb1f503c54bb2e5860abc1896f8d155106b4e9ce5cf2580ff7a740470c80
                                                    • Opcode Fuzzy Hash: 380fc3bfba7100691831687386ae16cfecec457c2c70292cecb050cb97cb13ad
                                                    • Instruction Fuzzy Hash: 8E21AE71500300AFEB20CFA5CD45BA6FBE8EF19314F08886AE9499B341D371E809CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • GetFileType.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED0BC5
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileType
                                                    • String ID:
                                                    • API String ID: 3081899298-0
                                                    • Opcode ID: d9d10bb4e6afee30a2b3ebbdeb30bad4b8edc83fddb74957676aea8414656a3c
                                                    • Instruction ID: 67f00b14e0fbce5ffc423357f7571005d8c8d1a84adc168f54e265843133dcbb
                                                    • Opcode Fuzzy Hash: d9d10bb4e6afee30a2b3ebbdeb30bad4b8edc83fddb74957676aea8414656a3c
                                                    • Instruction Fuzzy Hash: 53210AB5408780AFE7128B159C45BA7BFBCEF57324F08859BE9848B253D264A905CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    APIs
                                                    • LoadLibraryA.KERNEL32(?,00000E38), ref: 0027BB93
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: a7518a87b3978c994b6d55e1d057bcf772e219ef7fd39802f62456261d8bb29d
                                                    • Instruction ID: 69a023d29a8bcbff2c4f37efdf0c7851c0b8f21b016f9f2165ba470d51979d4d
                                                    • Opcode Fuzzy Hash: a7518a87b3978c994b6d55e1d057bcf772e219ef7fd39802f62456261d8bb29d
                                                    • Instruction Fuzzy Hash: F621C571005380AFE722CF10CC45FA6BFB8EF46724F1884DAED849F192D269A949CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.02%

                                                    APIs
                                                    • RegSetValueExW.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED0714
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID:
                                                    • API String ID: 3702945584-0
                                                    • Opcode ID: 80d9088bedfb45015c7f093fe56aeade51488a50cdf93796423c02ebde68bc27
                                                    • Instruction ID: cc98e5ca6e7da7407a05329ba078e8db1366a6303b57769703de544c120363dc
                                                    • Opcode Fuzzy Hash: 80d9088bedfb45015c7f093fe56aeade51488a50cdf93796423c02ebde68bc27
                                                    • Instruction Fuzzy Hash: 4F21BDB2504740AFE721CE10CC85F9BBFBCEF55324F08859BE9499B292D260E909CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.19%

                                                    APIs
                                                    • ioctlsocket.WS2_32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2A4B
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ioctlsocket
                                                    • String ID:
                                                    • API String ID: 3577187118-0
                                                    • Opcode ID: 5ee99bea69a898699b41d7c79b6c19de319459f216d366020e53189a5f3c8448
                                                    • Instruction ID: 674124078568115254d3c3e82083bdfd2ee76370dca5fd59b2c39685267cfe01
                                                    • Opcode Fuzzy Hash: 5ee99bea69a898699b41d7c79b6c19de319459f216d366020e53189a5f3c8448
                                                    • Instruction Fuzzy Hash: 7F21B671409384AFD712CB50CC45F9AFFB8EF56314F0885DBE944DF292D264A509C761
                                                    Uniqueness

                                                    Uniqueness Score: 0.45%

                                                    APIs
                                                    • RegOpenKeyExW.KERNEL32(?,00000E38), ref: 0027AC31
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: 8c585498d693543648952e18983ce6a304f8a065ac5dbd5813a2f90ad2181f50
                                                    • Instruction ID: 05a2ff25f5bd46494102480e4cd3fc660bb5233cd295338963d6de97aedc2daa
                                                    • Opcode Fuzzy Hash: 8c585498d693543648952e18983ce6a304f8a065ac5dbd5813a2f90ad2181f50
                                                    • Instruction Fuzzy Hash: 2D21D472500604BFEB21CF51DC85FABF7ACEF94724F04895BE905C6241D774E9188AB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • WSAEventSelect.WS2_32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2D12
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: EventSelect
                                                    • String ID:
                                                    • API String ID: 31538577-0
                                                    • Opcode ID: 7a111d355523b908cf418e76968da60b1abce758de14cfd15a1246cb70e71f82
                                                    • Instruction ID: cb79d8eb3d58534757f7898b1e451988f4f77be70be5af33004b041b513114b7
                                                    • Opcode Fuzzy Hash: 7a111d355523b908cf418e76968da60b1abce758de14cfd15a1246cb70e71f82
                                                    • Instruction Fuzzy Hash: 5421B072405340AFE721CB50CC44F9BFBBCEF56224F08899BEA44DB242D264E509CBB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.67%

                                                    APIs
                                                    • RegOpenKeyExW.KERNEL32(?,00000E38), ref: 00ED12F6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Open
                                                    • String ID:
                                                    • API String ID: 71445658-0
                                                    • Opcode ID: a9aaf6d6372d12600355ea99c5897e4b8e08d6a326b917aea81678656b16e4d1
                                                    • Instruction ID: 3c84e34cf431f7f7119bd592f113ae77bd1b6f435f14415048fe8c06100bd895
                                                    • Opcode Fuzzy Hash: a9aaf6d6372d12600355ea99c5897e4b8e08d6a326b917aea81678656b16e4d1
                                                    • Instruction Fuzzy Hash: 8521CD72500204BFEB20CFA1DC45FAAFBACEF55724F0488AAFD44DA245D771E9098A71
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • GetAdaptersAddresses.IPHLPAPI(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2DF1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AdaptersAddresses
                                                    • String ID:
                                                    • API String ID: 2506852604-0
                                                    • Opcode ID: 73f1d0dfa135c30f8bacdac045e682c567c3564c069570f2ef5549c50aa80478
                                                    • Instruction ID: e129ffe4a3f3ad5781666f1c157e6f0cb16776579af6d9b3a881632def93738e
                                                    • Opcode Fuzzy Hash: 73f1d0dfa135c30f8bacdac045e682c567c3564c069570f2ef5549c50aa80478
                                                    • Instruction Fuzzy Hash: AA21F871409780AFEB228F10DC45FA7FFB8EF56314F09849BE9859B253D264A509CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.71%

                                                    APIs
                                                    • WSAIoctl.WS2_32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2B49
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Ioctl
                                                    • String ID:
                                                    • API String ID: 3041054344-0
                                                    • Opcode ID: bddbb51c38009844f3933d9a212395dd1228e24efde462ff7f0a41bfacb81327
                                                    • Instruction ID: 83b45a95a7be6b6fe39bdd63fe31a534b49ceded77b54560518f7dffaad2fe0a
                                                    • Opcode Fuzzy Hash: bddbb51c38009844f3933d9a212395dd1228e24efde462ff7f0a41bfacb81327
                                                    • Instruction Fuzzy Hash: 9B21AC71100604AFEB208F51CC84FA6FBECEF68324F04896BEA499B251D771E909CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.86%

                                                    APIs
                                                    • CreateMutexW.KERNEL32(?,?), ref: 00ED233D
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateMutex
                                                    • String ID:
                                                    • API String ID: 1964310414-0
                                                    • Opcode ID: 8a22d43d052a066a0c093e35b3565da6fd4991cd4a005a7393797ce47afbb7a5
                                                    • Instruction ID: f075bb0b55fe5dbe2ffbef58a3d4ee9471b04e4a05820a79457ea450d778bb52
                                                    • Opcode Fuzzy Hash: 8a22d43d052a066a0c093e35b3565da6fd4991cd4a005a7393797ce47afbb7a5
                                                    • Instruction Fuzzy Hash: 7121CF71500240AFEB20CF65CD85BAAFBE8EF15324F08886EE948DB341E375E905CA71
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • setsockopt.WS2_32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED0D61
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: setsockopt
                                                    • String ID:
                                                    • API String ID: 3981526788-0
                                                    • Opcode ID: 31ad1e832a6a18e9921cb1c1f7fe81d1542f18ab76d323f031daa6ced2fe77d9
                                                    • Instruction ID: 528a46303b15ea6c043126a56aba92096575aa4261627a58e9b46a26a28125ac
                                                    • Opcode Fuzzy Hash: 31ad1e832a6a18e9921cb1c1f7fe81d1542f18ab76d323f031daa6ced2fe77d9
                                                    • Instruction Fuzzy Hash: 9321C272405340AFDB21CF50DC44F9BFFB8EF56324F08889BE9449B252D224A508CB71
                                                    Uniqueness

                                                    Uniqueness Score: 0.42%

                                                    APIs
                                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 00ED2EB2
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Connect
                                                    • String ID:
                                                    • API String ID: 3144859779-0
                                                    • Opcode ID: 06d3f936bb02b9a64835418765bd2c760ea05c42883063598e70a422e8165748
                                                    • Instruction ID: a6d84e2098ed6c86c4befb36c4e48c2f7a53794226e9fd3b8b1538af1129ca57
                                                    • Opcode Fuzzy Hash: 06d3f936bb02b9a64835418765bd2c760ea05c42883063598e70a422e8165748
                                                    • Instruction Fuzzy Hash: 182190764097809FDB22CF60CC45A92BFB4EF17314F0984DFE9858B263D271A809CB61
                                                    Uniqueness

                                                    Uniqueness Score: 1.18%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED1400
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 87467b93be3dd2b2cd7a8d9a0ebfd40ea099c297bedeb68d2bf06077088cd500
                                                    • Instruction ID: 5511dec74866261a1ad77dbec4876d159d56a65a6a457b0ebed94a75902a296e
                                                    • Opcode Fuzzy Hash: 87467b93be3dd2b2cd7a8d9a0ebfd40ea099c297bedeb68d2bf06077088cd500
                                                    • Instruction Fuzzy Hash: 0221AE72100200AFEB20CF51DC84FAAB7ACEF54714F0489ABE905DB241E770E9498A71
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 0027AD34
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 7f828f8f374cdfdd0ee291e7298ab473404184a47a3daf4eab12b9d941da6b9d
                                                    • Instruction ID: 43efd6311428af2c044cf868712a2356fb7952a766a386f4fda6b1f98d466c34
                                                    • Opcode Fuzzy Hash: 7f828f8f374cdfdd0ee291e7298ab473404184a47a3daf4eab12b9d941da6b9d
                                                    • Instruction Fuzzy Hash: A721CD72210200AFEB30CE55CC80FAAB7ACEF94720F04845AE909CB651D770E918CAB2
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • CreateDirectoryW.KERNEL32(?,?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 00ED055F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory
                                                    • String ID:
                                                    • API String ID: 4241100979-0
                                                    • Opcode ID: 7ecaf060b1b000c72dd7816b1acc76a84bbcc68e373eec67c35a9e6dbf023e0b
                                                    • Instruction ID: 784b17dfbde9890fece85ff497f712d5ab4bf004b4792143a444789268462a90
                                                    • Opcode Fuzzy Hash: 7ecaf060b1b000c72dd7816b1acc76a84bbcc68e373eec67c35a9e6dbf023e0b
                                                    • Instruction Fuzzy Hash: 252192725093809FDB11CB65DC55B96BFA8EF06220F0984EBEC45DB252D224D945CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • OpenFileMappingW.KERNELBASE(?,?), ref: 00ED1F91
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileMappingOpen
                                                    • String ID:
                                                    • API String ID: 1680863896-0
                                                    • Opcode ID: fb84f33b990bc5b58f1d4e7cddef293bb6a5bacdb369e1c6d70d58927435650d
                                                    • Instruction ID: 788ab7a272a9d08f1f558393382223800bd560fffa079b1c1ec9989f5ed8a429
                                                    • Opcode Fuzzy Hash: fb84f33b990bc5b58f1d4e7cddef293bb6a5bacdb369e1c6d70d58927435650d
                                                    • Instruction Fuzzy Hash: 5B21C671504340AFEB10CF55DC45BAAFBE8EF15314F0484AAED449B341D771E905CA71
                                                    Uniqueness

                                                    Uniqueness Score: 0.68%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileView
                                                    • String ID:
                                                    • API String ID: 3314676101-0
                                                    • Opcode ID: 4f14348361a17e164de4d5076fa3b43c844b43ee1b9c1482e3c7461236526f52
                                                    • Instruction ID: df23c8b60cf024873c0b60b4d15ad827a24eb7fe54869f4dfa78f7fe46847083
                                                    • Opcode Fuzzy Hash: 4f14348361a17e164de4d5076fa3b43c844b43ee1b9c1482e3c7461236526f52
                                                    • Instruction Fuzzy Hash: F021C372000204AFEB21CF55DC45F9AFBE8EF19324F04885EEA459B741D772E559CBA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.53%

                                                    APIs
                                                    • K32GetModuleInformation.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED307A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: InformationModule
                                                    • String ID:
                                                    • API String ID: 3425974696-0
                                                    • Opcode ID: cd72c2a1bcd340b67e62fef0285cf57c7b4783c4c1f7a1922848ed41aa28d40a
                                                    • Instruction ID: c8498b544337e3250b7cfe43079aea7487509ff5f566baf0e01cbe1ae63affc0
                                                    • Opcode Fuzzy Hash: cd72c2a1bcd340b67e62fef0285cf57c7b4783c4c1f7a1922848ed41aa28d40a
                                                    • Instruction Fuzzy Hash: 8411A271100204AFEB20CF65DC45FAAF7ACEF55324F04896AE905DB241D761E9498A72
                                                    Uniqueness

                                                    Uniqueness Score: 2.12%

                                                    APIs
                                                    • WSASocketW.WS2_32(?,?,?,?,?), ref: 00ED19DA
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Socket
                                                    • String ID:
                                                    • API String ID: 38366605-0
                                                    • Opcode ID: b982fbc7732dea426053477e1262224007f21eec106cb982fa38125d5d43abcb
                                                    • Instruction ID: c05374ba84e8823391fdbd9943d344565eff631bb4d7571090be0bad33353e93
                                                    • Opcode Fuzzy Hash: b982fbc7732dea426053477e1262224007f21eec106cb982fa38125d5d43abcb
                                                    • Instruction Fuzzy Hash: F421D171405200BFEB21CF91DD45BAAFBE8EF49324F0488AEE9459B351D371E418CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.66%

                                                    APIs
                                                    • CopyFileW.KERNEL32(?,?,?), ref: 00ED0622
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CopyFile
                                                    • String ID:
                                                    • API String ID: 1304948518-0
                                                    • Opcode ID: b1b6bf4f2a07ad375febcbc8ceac4d24f101d5abddf34ff27327a4c5d169590b
                                                    • Instruction ID: edee4e9e7c33e60fa86b2e0454220bac7a69dd974ac6785f96248c7850f60f5e
                                                    • Opcode Fuzzy Hash: b1b6bf4f2a07ad375febcbc8ceac4d24f101d5abddf34ff27327a4c5d169590b
                                                    • Instruction Fuzzy Hash: 682193B25053809FDB11CF65DC49B52BFE8EF56210F0C84ABE945DB652D264D814CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.26%

                                                    APIs
                                                    • RegSetValueExW.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED0714
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Value
                                                    • String ID:
                                                    • API String ID: 3702945584-0
                                                    • Opcode ID: 8600dbdecef1f955f968b5ca251931ff233ccda2710528f42e2beb3311da750f
                                                    • Instruction ID: 2035bd8b190fe0ec3d756107153c9aea1e2411896f014321b2748c2e8ae08d73
                                                    • Opcode Fuzzy Hash: 8600dbdecef1f955f968b5ca251931ff233ccda2710528f42e2beb3311da750f
                                                    • Instruction Fuzzy Hash: A711B172500700AFEB209E51CC45FABFBACEF55724F08855BE9459A341D760E905CAB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.19%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED1CFC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: e37bcdb9a092c1fc33c7d2bb1d9487ebda97f8151cf2cd26d37b46765fb73480
                                                    • Instruction ID: d3132fe79dbf3b8d66d508c1b30d62b0592f11ad6f2873b7790759f57d1c433b
                                                    • Opcode Fuzzy Hash: e37bcdb9a092c1fc33c7d2bb1d9487ebda97f8151cf2cd26d37b46765fb73480
                                                    • Instruction Fuzzy Hash: B211B172500604AFEB20CF51CC81FA7F7ECEF55724F04899AE9459B241E760E949CA71
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • DeleteFileW.KERNEL32(?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 00ED07C4
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DeleteFile
                                                    • String ID:
                                                    • API String ID: 4033686569-0
                                                    • Opcode ID: e37e566f934352b928183cbd5979b8eb640ce28065f8d6df300f8ed3cc8822b7
                                                    • Instruction ID: e6b84714f477d8a249ff30bbe1ebc3a320c2f33c220dde1fb59a7056f4daf2f7
                                                    • Opcode Fuzzy Hash: e37e566f934352b928183cbd5979b8eb640ce28065f8d6df300f8ed3cc8822b7
                                                    • Instruction Fuzzy Hash: E3219D725093809FDB12CB25DC55B52BFA8DF03224F0C80EBED84CF252D265E809CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00ED0122
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LookupPrivilegeValue
                                                    • String ID:
                                                    • API String ID: 3899507212-0
                                                    • Opcode ID: 220b5fd7a66c03dd4ee48d66e33c40f9340c99b92fc0bd4ca43e2c5456ead609
                                                    • Instruction ID: d3822ad67eca549801da7983d23374c1850a6f553e5044e80a19c7bb51a62424
                                                    • Opcode Fuzzy Hash: 220b5fd7a66c03dd4ee48d66e33c40f9340c99b92fc0bd4ca43e2c5456ead609
                                                    • Instruction Fuzzy Hash: F8116D725053809FDB61CF65DC89B57BFE8EF16320F0884AAE949DB252D264E808CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.02%

                                                    APIs
                                                    • GetProcessTimes.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED25F9
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ProcessTimes
                                                    • String ID:
                                                    • API String ID: 1995159646-0
                                                    • Opcode ID: c755a6c0662cb9508ae20953ca9b23ffc10bcb30ab882f75f21316b85560ec03
                                                    • Instruction ID: 9d7a0b1bcc8ede90590dd2c1555555b5e67ed712579667ce9eee9b6a4aa2869c
                                                    • Opcode Fuzzy Hash: c755a6c0662cb9508ae20953ca9b23ffc10bcb30ab882f75f21316b85560ec03
                                                    • Instruction Fuzzy Hash: 1E110072100300AFEB208F91DC45FAAFBACEF65324F04886AEA059A241E770E4058BB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.67%

                                                    APIs
                                                    • GetNetworkParams.IPHLPAPI(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED17EC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: NetworkParams
                                                    • String ID:
                                                    • API String ID: 2134775280-0
                                                    • Opcode ID: 4ca0029da7226591013270c317747a914d494b7c668c6a46f42c5a1bd5005534
                                                    • Instruction ID: d5fe827cc1b7467d2182509f4f16d457d26944a014c38a52b328dcdacb5bbc53
                                                    • Opcode Fuzzy Hash: 4ca0029da7226591013270c317747a914d494b7c668c6a46f42c5a1bd5005534
                                                    • Instruction Fuzzy Hash: 2711D371405384AFE712CF51DC45F9AFFBCEF46324F0884DBE9449B292D264A949CBA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.80%

                                                    APIs
                                                    • CertVerifyCertificateChainPolicy.CRYPT32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED3D52
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CertCertificateChainPolicyVerify
                                                    • String ID:
                                                    • API String ID: 3930008701-0
                                                    • Opcode ID: a411d83d52cf8773626079c991dbf06dc27369c9be2ca2753456df432ced8d08
                                                    • Instruction ID: e27dd03105c2a162cceda742d9e01975fdedf2adaf8b151c2ec06a8fa467ac66
                                                    • Opcode Fuzzy Hash: a411d83d52cf8773626079c991dbf06dc27369c9be2ca2753456df432ced8d08
                                                    • Instruction Fuzzy Hash: 9B11D072100200AFEB208F65DC45BAAFBACEF55324F18886BED059A241D770EA058E72
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    • WSAEventSelect.WS2_32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2D12
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: EventSelect
                                                    • String ID:
                                                    • API String ID: 31538577-0
                                                    • Opcode ID: 9b93c33d780af492b778671cc98e5a9a47cf13671fa7f69680f1a1b2f0ab61f2
                                                    • Instruction ID: 36df22eac6c391e8ac32c954e59eb6935ba49da6e56f92ddd290a17b8feaa9b2
                                                    • Opcode Fuzzy Hash: 9b93c33d780af492b778671cc98e5a9a47cf13671fa7f69680f1a1b2f0ab61f2
                                                    • Instruction Fuzzy Hash: 2611B272400204AEEB21CF91CC85F9AF7ACEF65324F04896BEA05DB245E774E5058AB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.67%

                                                    APIs
                                                    • K32EnumProcessModules.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2F8A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: EnumModulesProcess
                                                    • String ID:
                                                    • API String ID: 1082081703-0
                                                    • Opcode ID: 6f7df04f7b3368c96815da3c0d7bf4f2edd7e3dcfeeb19150628203afffe7231
                                                    • Instruction ID: 870e33090ab6438f6fbd1cf09da28eba9d35e47c862b3c05e30f194d3bb44a83
                                                    • Opcode Fuzzy Hash: 6f7df04f7b3368c96815da3c0d7bf4f2edd7e3dcfeeb19150628203afffe7231
                                                    • Instruction Fuzzy Hash: 7311B672500200AFEB108F55DC45BAAF7ACEF55324F04896BE905DB245D771E5458B71
                                                    Uniqueness

                                                    Uniqueness Score: 0.70%

                                                    APIs
                                                    • SetWindowsHookExW.USER32(?,00000E38,?,?), ref: 0027AE26
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: HookWindows
                                                    • String ID:
                                                    • API String ID: 2559412058-0
                                                    • Opcode ID: f09a2aabf692e83301f327847ab1011dc97897eb7bc5412462d7d13755c31c34
                                                    • Instruction ID: 5329637d380986d58cfbc80cafc2feb8fb81ab796d6deb69f97a74dc20569d47
                                                    • Opcode Fuzzy Hash: f09a2aabf692e83301f327847ab1011dc97897eb7bc5412462d7d13755c31c34
                                                    • Instruction Fuzzy Hash: E011D3715057406FD311CF15DC42F62BFB8EF86A20F18819AEC488B642D225BA29CBE2
                                                    Uniqueness

                                                    Uniqueness Score: 0.73%

                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 0027A26C
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: 2a192fa793becd139e7075b92ec501a120980f5a77ba3356e2a3a50691f828ca
                                                    • Instruction ID: bed9a56a50b42e0b08d060acd6fdabbf29f3608c775db62ed60a5d2f62c074e9
                                                    • Opcode Fuzzy Hash: 2a192fa793becd139e7075b92ec501a120980f5a77ba3356e2a3a50691f828ca
                                                    • Instruction Fuzzy Hash: A521607540E7C05FD7138B25CC55652BFB4AF57220F0E84DBD9848F263D2699908CB72
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • DuplicateHandle.KERNEL32(?,?,?,?,?,?,?), ref: 0027AB32
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 5c0cfd0effd0489da97eea24b6eb55f362340ef7698de127961601ce6fae9996
                                                    • Instruction ID: 56ba87365c35ab2339f085d81e4b3e1645cd7be5b6d0ece360752a215059d02c
                                                    • Opcode Fuzzy Hash: 5c0cfd0effd0489da97eea24b6eb55f362340ef7698de127961601ce6fae9996
                                                    • Instruction Fuzzy Hash: 64118472409780AFDB228F54DC44A62FFF4EF5A324F0884DAFD898B652D375A418DB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    APIs
                                                    • setsockopt.WS2_32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED0D61
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: setsockopt
                                                    • String ID:
                                                    • API String ID: 3981526788-0
                                                    • Opcode ID: 2c590ee54a49e8e0456f65247e0c16b9424be3878951241838aed697bcd7cb4e
                                                    • Instruction ID: 8aa584ec570a671f84429f9683589610493927c5e356595d4279e7516a737092
                                                    • Opcode Fuzzy Hash: 2c590ee54a49e8e0456f65247e0c16b9424be3878951241838aed697bcd7cb4e
                                                    • Instruction Fuzzy Hash: 4C11C472400600AFEB21CF91DC45F9AFBACEF55324F08895BE9459B245D771E509CBB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.42%

                                                    APIs
                                                    • OleGetClipboard.OLE32(?,00000E38,?,?), ref: 0027A552
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Clipboard
                                                    • String ID:
                                                    • API String ID: 220874293-0
                                                    • Opcode ID: 74e6c36c77890706688e5dfe33ea8cb9cec44a2a424d0e29d301f98f0e96eb08
                                                    • Instruction ID: 94a542595db269ab79b983cec71dcc2cf8d723d27cb0349479c1e51bd3760937
                                                    • Opcode Fuzzy Hash: 74e6c36c77890706688e5dfe33ea8cb9cec44a2a424d0e29d301f98f0e96eb08
                                                    • Instruction Fuzzy Hash: C911B6755093806FD311CB55CC55F66BFB8EF86610F09819AE8444B652D224B919CBA2
                                                    Uniqueness

                                                    Uniqueness Score: 6.84%

                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNEL32(?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 00ED14B8
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemoryStatus
                                                    • String ID:
                                                    • API String ID: 1890195054-0
                                                    • Opcode ID: 128952538e7fd3a194664cde27a35f6b214886789d40f4407035c7a411e8d5ae
                                                    • Instruction ID: b88b4c77889f9078db69df1da16fca5531464518a45fe10e27c703223a2ce7fd
                                                    • Opcode Fuzzy Hash: 128952538e7fd3a194664cde27a35f6b214886789d40f4407035c7a411e8d5ae
                                                    • Instruction Fuzzy Hash: DA1190715093C0AFDB128B65DC45B52BFB4EF07320F0884EBED858F262D235A808CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.62%

                                                    APIs
                                                    • ioctlsocket.WS2_32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2A4B
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ioctlsocket
                                                    • String ID:
                                                    • API String ID: 3577187118-0
                                                    • Opcode ID: b842b28bd1fddfcf379a2dfb171ae2b19604e678ec4df79b4a3541fb4af6c7cf
                                                    • Instruction ID: b2e209d1f7ed1174161791c60c0baf7e88ffb80b1b448aed7bac7a381f0d0bf2
                                                    • Opcode Fuzzy Hash: b842b28bd1fddfcf379a2dfb171ae2b19604e678ec4df79b4a3541fb4af6c7cf
                                                    • Instruction Fuzzy Hash: 7B11E372400204AFEB20CF51CC45FAAFBACEF65324F04896BEA089B245D774E505CAB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.45%

                                                    APIs
                                                    • GetAdaptersAddresses.IPHLPAPI(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED2DF1
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: AdaptersAddresses
                                                    • String ID:
                                                    • API String ID: 2506852604-0
                                                    • Opcode ID: bf52acf7928ebe2b532678b51fd47c6361393c0d3253f3a724cd5b17a33c076e
                                                    • Instruction ID: e173319ba352ce915e26aca8e553bb944551a6d4a5092f783356b00902889288
                                                    • Opcode Fuzzy Hash: bf52acf7928ebe2b532678b51fd47c6361393c0d3253f3a724cd5b17a33c076e
                                                    • Instruction Fuzzy Hash: A511E031000600AFEB218F41DC81FAAFBA8EF65324F04895BEE459A241D371E509CAB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.71%

                                                    APIs
                                                    • LoadLibraryA.KERNEL32(?,00000E38), ref: 0027BB93
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad
                                                    • String ID:
                                                    • API String ID: 1029625771-0
                                                    • Opcode ID: 77aca04382b261cf64f4ae0ae4fdb4c14d8ddeb54a3a25747355882d9f033c1a
                                                    • Instruction ID: 361f0a1f941841ff5e30715d6e40e7a579611a6468812148d1ffcea20497ab5a
                                                    • Opcode Fuzzy Hash: 77aca04382b261cf64f4ae0ae4fdb4c14d8ddeb54a3a25747355882d9f033c1a
                                                    • Instruction Fuzzy Hash: A8112531510204AFEB21CF01DC85FAAFBACDF45724F14C45AFD489A285D3B5A948CAA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.02%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: recv
                                                    • String ID:
                                                    • API String ID: 1507349165-0
                                                    • Opcode ID: f65841ab3dca8391f9fee03484bc308f33761ac5a3798528fcb9b55387ae0946
                                                    • Instruction ID: 8bc182b216390b8ad9d4f4ac8bd53a9a7e2aacd133de7c1c581a504fb69fe23f
                                                    • Opcode Fuzzy Hash: f65841ab3dca8391f9fee03484bc308f33761ac5a3798528fcb9b55387ae0946
                                                    • Instruction Fuzzy Hash: 9811C172409380AFDB22CF54DC45B56FFB4EF56224F08C4DAED888B252D275A818CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 00ED0122
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: LookupPrivilegeValue
                                                    • String ID:
                                                    • API String ID: 3899507212-0
                                                    • Opcode ID: 790dc479512bb471d4be9bf7af8d6294ed600d379c6a832c383cb79a22cce7c4
                                                    • Instruction ID: 1573d4abcf23acb8024a98fcdeb424e080588ae26f4902f4da198dce687a7b29
                                                    • Opcode Fuzzy Hash: 790dc479512bb471d4be9bf7af8d6294ed600d379c6a832c383cb79a22cce7c4
                                                    • Instruction Fuzzy Hash: 4E1182726013409FEB50CF55DC85756FBE8EF15324F08846BEC09DB341D671D804CA61
                                                    Uniqueness

                                                    Uniqueness Score: 0.02%

                                                    APIs
                                                    • CopyFileW.KERNEL32(?,?,?), ref: 00ED0622
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CopyFile
                                                    • String ID:
                                                    • API String ID: 1304948518-0
                                                    • Opcode ID: 790dc479512bb471d4be9bf7af8d6294ed600d379c6a832c383cb79a22cce7c4
                                                    • Instruction ID: 3152a96f621a40c3d82ac5ea96d76f9c9f5d08ad16d6cb48c704c040969dfbbc
                                                    • Opcode Fuzzy Hash: 790dc479512bb471d4be9bf7af8d6294ed600d379c6a832c383cb79a22cce7c4
                                                    • Instruction Fuzzy Hash: 87118EB26003409FEB60CF69D885B56FBD8EF55324F0C84ABEC19DB741E671E814CA62
                                                    Uniqueness

                                                    Uniqueness Score: 0.26%

                                                    APIs
                                                    • GetNetworkParams.IPHLPAPI(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED17EC
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: NetworkParams
                                                    • String ID:
                                                    • API String ID: 2134775280-0
                                                    • Opcode ID: a832ab56cc5836eebbb09df318b3b7bfe6f8ad0a45e9afcdc97ebb7afa12d9e7
                                                    • Instruction ID: 776a43d75b6017661176443c8482aadb16ef751bd4d8fa08107219bd342e59d6
                                                    • Opcode Fuzzy Hash: a832ab56cc5836eebbb09df318b3b7bfe6f8ad0a45e9afcdc97ebb7afa12d9e7
                                                    • Instruction Fuzzy Hash: DB010431400244BEEB10CF41DC85FAAFBACEF55324F048497ED049B241D774E545CAB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.80%

                                                    APIs
                                                    • FindClose.KERNEL32(?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 00ED09C8
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CloseFind
                                                    • String ID:
                                                    • API String ID: 1863332320-0
                                                    • Opcode ID: 33ec6b502664e803d63842bcf9f919078e5646194d718a19b194d7b5c227c719
                                                    • Instruction ID: edfa00e04c489b798d5bd6029d6d62d1ee6d70279a7c54151153023f339f5626
                                                    • Opcode Fuzzy Hash: 33ec6b502664e803d63842bcf9f919078e5646194d718a19b194d7b5c227c719
                                                    • Instruction Fuzzy Hash: F011CE725093C09FDB128F25DC99B52BFA4DF53220F0880EBED858B253D264A948CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.09%

                                                    APIs
                                                    • GetFileType.KERNEL32(?,00000E38,D6839D4A,00000000,00000000,00000000,00000000), ref: 00ED0BC5
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileType
                                                    • String ID:
                                                    • API String ID: 3081899298-0
                                                    • Opcode ID: 0c6522666f9e5e65c9165960a090d54bf95124f123fb6757fc5a5d71f47ce2b9
                                                    • Instruction ID: 59490a2bb0db5d50b8e3fd1295cc067591a344f9b18c18c507799139ecee9980
                                                    • Opcode Fuzzy Hash: 0c6522666f9e5e65c9165960a090d54bf95124f123fb6757fc5a5d71f47ce2b9
                                                    • Instruction Fuzzy Hash: 3B010031004200AFEB108F41DC85BAAFBACEF95328F088497ED059B241D775E9098AB1
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    APIs
                                                    • CreateDirectoryW.KERNEL32(?,?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 00ED055F
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory
                                                    • String ID:
                                                    • API String ID: 4241100979-0
                                                    • Opcode ID: 9c194a63052d1b2b87e916ed13ea20fda37f508d1a964a4bcc9f56da44c74b29
                                                    • Instruction ID: 5776a5c22f29edd342bee9bb2b27eea73327323c721a9af6a28f8222ecd7108f
                                                    • Opcode Fuzzy Hash: 9c194a63052d1b2b87e916ed13ea20fda37f508d1a964a4bcc9f56da44c74b29
                                                    • Instruction Fuzzy Hash: 96118E716002409FEF60CF59E885BA6BBD8EF05224F0C84ABEC09DB341E674E905CF61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 00ED2EB2
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Connect
                                                    • String ID:
                                                    • API String ID: 3144859779-0
                                                    • Opcode ID: 24bcfe7cae6057518afc56a6f255c7c1394b8bb868f2c08f92e116fd660b540f
                                                    • Instruction ID: 45a71bec2e63761b3adbced1c239d9b58d12494375f8a4ce7511f663e59ad826
                                                    • Opcode Fuzzy Hash: 24bcfe7cae6057518afc56a6f255c7c1394b8bb868f2c08f92e116fd660b540f
                                                    • Instruction Fuzzy Hash: A8119E31400604AFDB21CF55C844B56FBE4EF19310F0885ABEE459B211D332E418DB61
                                                    Uniqueness

                                                    Uniqueness Score: 1.18%

                                                    APIs
                                                    • CertGetCertificateChain.CRYPT32(?,00000E38,?,?), ref: 00ED2C56
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CertCertificateChain
                                                    • String ID:
                                                    • API String ID: 3019455780-0
                                                    • Opcode ID: c692c3688cc900527e87099cc78bb65c30cb2de15c86131c7bbfa07a0695253c
                                                    • Instruction ID: 31379f55be20df41a4a071ee666145a1bbb0cf88ba956d82246ae98051f85f61
                                                    • Opcode Fuzzy Hash: c692c3688cc900527e87099cc78bb65c30cb2de15c86131c7bbfa07a0695253c
                                                    • Instruction Fuzzy Hash: 0401B172900200AFD350DF16DC46B66FBA8FF89A20F14855AED088B741D731F515CBE1
                                                    Uniqueness

                                                    Uniqueness Score: 16.53%

                                                    APIs
                                                    • DeleteFileW.KERNEL32(?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 00ED07C4
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DeleteFile
                                                    • String ID:
                                                    • API String ID: 4033686569-0
                                                    • Opcode ID: 96876b1fe110c0a6de2a8ccef8d5c14c4858596666d78815f2d8016c1e0487d3
                                                    • Instruction ID: e8683396bc5a871072cdf16e5216b8378148547cf859d5ff2ded8cd417c5f376
                                                    • Opcode Fuzzy Hash: 96876b1fe110c0a6de2a8ccef8d5c14c4858596666d78815f2d8016c1e0487d3
                                                    • Instruction Fuzzy Hash: E9019E726003409FEB10DF69D8897A6BB98EF11224F0884ABEC09DF346D675E844CEA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • K32GetModuleFileNameExW.KERNEL32(?,00000E38,?,?), ref: 00ED3186
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileModuleName
                                                    • String ID:
                                                    • API String ID: 514040917-0
                                                    • Opcode ID: 83209b2c9b94e9da92460078430142904dffe904ac384a10edae58a19ee951c5
                                                    • Instruction ID: 4116fb5b479d2dfc34fcd31f6e8f03a0d6ced627d5aaa4ae66a72052e3162400
                                                    • Opcode Fuzzy Hash: 83209b2c9b94e9da92460078430142904dffe904ac384a10edae58a19ee951c5
                                                    • Instruction Fuzzy Hash: F401B172900200AFD310CF16DC46B66FBA8FF89A20F14855AED088B741D731F515CAE1
                                                    Uniqueness

                                                    Uniqueness Score: 0.15%

                                                    APIs
                                                    • FindNextFileW.KERNELBASE(?,00000E38,?,?), ref: 0027A1C2
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FileFindNext
                                                    • String ID:
                                                    • API String ID: 2029273394-0
                                                    • Opcode ID: acdf95dd992c7e94074fab8eefa451a3c00b9768e0d4b67e5e6347953cbc727f
                                                    • Instruction ID: 6fb5a465df5f1bcd87c487aa434679fb13a8e7a2bd58ca270c8e366c6c82da8f
                                                    • Opcode Fuzzy Hash: acdf95dd992c7e94074fab8eefa451a3c00b9768e0d4b67e5e6347953cbc727f
                                                    • Instruction Fuzzy Hash: 7701D472900200AFD710CF16DC46B66FBA8FF89A20F14855AED088B741D735F515CBE1
                                                    Uniqueness

                                                    Uniqueness Score: 0.11%

                                                    APIs
                                                    • DuplicateHandle.KERNEL32(?,?,?,?,?,?,?), ref: 0027AB32
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: DuplicateHandle
                                                    • String ID:
                                                    • API String ID: 3793708945-0
                                                    • Opcode ID: 24693d360de3055f116e9a30d0938a8528b642928e94e3a7ea143180681c76f2
                                                    • Instruction ID: 4eab3e4c7a1984fa5ba60f25ed21707153ef41d4e71516cdbf368bf6ff8fa47b
                                                    • Opcode Fuzzy Hash: 24693d360de3055f116e9a30d0938a8528b642928e94e3a7ea143180681c76f2
                                                    • Instruction Fuzzy Hash: 3E01CB32410700AFDF208F95C884B56FBA0EF69324F08C8AAED494A211C372E428CB62
                                                    Uniqueness

                                                    Uniqueness Score: 0.23%

                                                    APIs
                                                    • RegQueryValueExW.KERNEL32(?,00000E38,?,?), ref: 00ED174A
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 454ce426a69c4fdd776cbfd0f819fabd6019aff0dbed9f5c1457eba3e083a8af
                                                    • Instruction ID: df15e47c6b03a7edee14ef732307af75b225cb071179d0b9d7d6c6b12e52e7e8
                                                    • Opcode Fuzzy Hash: 454ce426a69c4fdd776cbfd0f819fabd6019aff0dbed9f5c1457eba3e083a8af
                                                    • Instruction Fuzzy Hash: CF01A271900600ABD250CF16DC46B66FBA8FF89B20F14815AED084B741D771F565CAE6
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    • GlobalMemoryStatusEx.KERNEL32(?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 00ED14B8
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: GlobalMemoryStatus
                                                    • String ID:
                                                    • API String ID: 1890195054-0
                                                    • Opcode ID: 7fe65e43b5e7b32f31689505e8a9a7965520ef8200e0d539cbc9b89069ef137e
                                                    • Instruction ID: 47940a59cc88303a1d25a774e410f8ff73adcaf77bb5f4056705a13555f7c597
                                                    • Opcode Fuzzy Hash: 7fe65e43b5e7b32f31689505e8a9a7965520ef8200e0d539cbc9b89069ef137e
                                                    • Instruction Fuzzy Hash: C501DF71500280AFEF108F59D8857A6FBA8EF11324F08C4EBEC098B306D275E848CAA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.62%

                                                    APIs
                                                    • SHGetFolderPathW.SHELL32(?,00000E38,?,?), ref: 00ED08B6
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: FolderPath
                                                    • String ID:
                                                    • API String ID: 1514166925-0
                                                    • Opcode ID: edbdc4b4349fc9b0744c8a5d4cf0b8cf1dee709103f6cb516eedca95b38f3730
                                                    • Instruction ID: b6d15b120196ea0011dc12c3265e9e0afce9ecdaa2efe3d4c417d81a19a459b8
                                                    • Opcode Fuzzy Hash: edbdc4b4349fc9b0744c8a5d4cf0b8cf1dee709103f6cb516eedca95b38f3730
                                                    • Instruction Fuzzy Hash: FE01A271900600ABD250CF16DC46F66FBA8FF89B20F14815AED084B741D731F565CAE6
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    APIs
                                                    • RegEnumKeyExW.KERNEL32(?,00000E38,?,?), ref: 00ED1236
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Enum
                                                    • String ID:
                                                    • API String ID: 2928410991-0
                                                    • Opcode ID: 4443e8a2d87b6c69daccdfa166ac248fe27d9ab55c0dbdbc0d118e2bac5f00f1
                                                    • Instruction ID: 88fe7144ace2a97807a52c24a36d00f5b744bb186cc0ce920cf61e5752d11152
                                                    • Opcode Fuzzy Hash: 4443e8a2d87b6c69daccdfa166ac248fe27d9ab55c0dbdbc0d118e2bac5f00f1
                                                    • Instruction Fuzzy Hash: D701A271900600ABD250DF16DC46B66FBA8FF89B20F14815AED084B741D731F565CBE6
                                                    Uniqueness

                                                    Uniqueness Score: 0.05%

                                                    APIs
                                                    • OleGetClipboard.OLE32(?,00000E38,?,?), ref: 0027A552
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: Clipboard
                                                    • String ID:
                                                    • API String ID: 220874293-0
                                                    • Opcode ID: 2996f488a4df2819bdf28920e0160e605ab47b5bf1df2a9dfbdc68be7f0b9401
                                                    • Instruction ID: 606250340af48cdde21d59fa704654dd46a4d44ca000f8ea92c51b526406dc57
                                                    • Opcode Fuzzy Hash: 2996f488a4df2819bdf28920e0160e605ab47b5bf1df2a9dfbdc68be7f0b9401
                                                    • Instruction Fuzzy Hash: 3A01A271900600ABD250CF16DC46B66FBA8FF89A20F14815AED084B741D735F555CAE6
                                                    Uniqueness

                                                    Uniqueness Score: 6.84%

                                                    APIs
                                                    • SetWindowsHookExW.USER32(?,00000E38,?,?), ref: 0027AE26
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: HookWindows
                                                    • String ID:
                                                    • API String ID: 2559412058-0
                                                    • Opcode ID: 176189e423a9543c7e86f966941913ca884f0672c1335d3d90811ab70bd7616a
                                                    • Instruction ID: 661b056ee06f09150dd68d68e2cf6bb4545c3e7031d678041b7d629f9179cfe4
                                                    • Opcode Fuzzy Hash: 176189e423a9543c7e86f966941913ca884f0672c1335d3d90811ab70bd7616a
                                                    • Instruction Fuzzy Hash: A601A271900600ABD250DF16DC46B66FBA8FF89B20F14815AED084B741D731F565CBE6
                                                    Uniqueness

                                                    Uniqueness Score: 0.73%

                                                    APIs
                                                    • FindClose.KERNEL32(?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 00ED09C8
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CloseFind
                                                    • String ID:
                                                    • API String ID: 1863332320-0
                                                    • Opcode ID: efa5afedc7e0f6d431013390da20d9640d0f32ea10a8cdd9d5d451882de9195d
                                                    • Instruction ID: 4f5cc32f541e1472ceb31bb0d96369d48dae88bb7b883f0504958fa8431deb22
                                                    • Opcode Fuzzy Hash: efa5afedc7e0f6d431013390da20d9640d0f32ea10a8cdd9d5d451882de9195d
                                                    • Instruction Fuzzy Hash: 3E01D1355007409FEF108F1AD8857A5FF94EF92324F0CC0ABDD499B352D275E849CAA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.09%

                                                    APIs
                                                    • SetClipboardViewer.USER32(?), ref: 0027A7E8
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ClipboardViewer
                                                    • String ID:
                                                    • API String ID: 1084444317-0
                                                    • Opcode ID: 70c9c0aafc93e15bbcc953c1cb5e743c4a15aa4c0e8eb8a7dd7f385944bf4455
                                                    • Instruction ID: 96f4ac0f254521a6f11f4ce4448a2b7fdcc678307965fc2f7b39a41b22af01e8
                                                    • Opcode Fuzzy Hash: 70c9c0aafc93e15bbcc953c1cb5e743c4a15aa4c0e8eb8a7dd7f385944bf4455
                                                    • Instruction Fuzzy Hash: B001A2714142409FEF10CF55D885759FBA4EF55330F08C4AADD098F306D375A814CAA3
                                                    Uniqueness

                                                    Uniqueness Score: 5.54%

                                                    APIs
                                                    • SetErrorMode.KERNEL32(?,D6839D4A,00000000,?,?,?,?,?,?,?,?,6E923C58), ref: 0027A26C
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: ErrorMode
                                                    • String ID:
                                                    • API String ID: 2340568224-0
                                                    • Opcode ID: f6e0bc33f4546bf67c492e6181790a1e050dd67954122fc7fbf57dc44613d997
                                                    • Instruction ID: 1173ced1c7745a352b7666fdd58cf5304ee7b0174d18b4c8eda77d45b5d05f5f
                                                    • Opcode Fuzzy Hash: f6e0bc33f4546bf67c492e6181790a1e050dd67954122fc7fbf57dc44613d997
                                                    • Instruction Fuzzy Hash: 14F0AF354247449FEB108F05D885765FBA4EFA6730F08C0AADD094B316D3B6E958CAA3
                                                    Uniqueness

                                                    Uniqueness Score: 0.01%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: \d8
                                                    • API String ID: 0-3010730235
                                                    • Opcode ID: 1a8159bb1a570fb4702d736495ee666fcd4230a2b20ace7967496ee37343694a
                                                    • Instruction ID: ea868d9306ddb17c4074a8b2db22eb8bb4415813627715be4c2b313db4c279c1
                                                    • Opcode Fuzzy Hash: 1a8159bb1a570fb4702d736495ee666fcd4230a2b20ace7967496ee37343694a
                                                    • Instruction Fuzzy Hash: FA511531A082858FCB04EB78D8502EE7BB29F99314B1548BFD246EB391DB359C55C7A2
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: E$:9
                                                    • API String ID: 0-3362180958
                                                    • Opcode ID: 4713b334bd8a7147a7839910aeada5244b54e83d0aa57901b1d650fb992d1616
                                                    • Instruction ID: df65a2210b9c624217b8c1a0c15b8c89bafa33f22425a82c39d31d92bd419a2d
                                                    • Opcode Fuzzy Hash: 4713b334bd8a7147a7839910aeada5244b54e83d0aa57901b1d650fb992d1616
                                                    • Instruction Fuzzy Hash: 45212670B001569FCB44CF78C860BAFBAE9EBC4310F14807AE489DB651D776DD118790
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: E$:9
                                                    • API String ID: 0-3362180958
                                                    • Opcode ID: 20848082d971b027a5776e10e5d57b7b3374ddfd7e7cfce97c2e5e2a8929dfbe
                                                    • Instruction ID: 618226c8da33141252149d2f81983a3dd68240ed71911aa3f7e4ee341d0bac4b
                                                    • Opcode Fuzzy Hash: 20848082d971b027a5776e10e5d57b7b3374ddfd7e7cfce97c2e5e2a8929dfbe
                                                    • Instruction Fuzzy Hash: 94210570F101828FCF44DFBCD8607AEBAEAAB84614F148076E549DB650EF72D9048791
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: 683d0fe7612064837fe283f82c903f1d9676c01f4f0f1dc438c34a55583b13bd
                                                    • Instruction ID: a9bccbe685efa362b6c9d2f3cefcd8e4bf26b83d454b64b2be2bfa129134c6ad
                                                    • Opcode Fuzzy Hash: 683d0fe7612064837fe283f82c903f1d9676c01f4f0f1dc438c34a55583b13bd
                                                    • Instruction Fuzzy Hash: 8F219F725093C05FDB028B25DC55A92BFA4AF17324F0980DAE9858F663D2649908CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: f322ef678a1563000cad11be35a4ad0e4584f3f053b0c55af2c1cb4494904a55
                                                    • Instruction ID: 0f5c0e6824050908184576bb71b44d5043c137acaa12e0ce3fe21e3f5677dd70
                                                    • Opcode Fuzzy Hash: f322ef678a1563000cad11be35a4ad0e4584f3f053b0c55af2c1cb4494904a55
                                                    • Instruction Fuzzy Hash: A221A1755093C09FDB128F65C849756BFB4EF03224F0880EBEC858F653D2659908CB61
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594112758.00ED0000.00000040.00000001.sdmp, Offset: 00ED0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ed0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: 6c9cf0f4e773748aef2295a3126ef5d9376f2b22f4ef2bb222f74cc4e0dddb4a
                                                    • Instruction ID: c08e421cb85b646937c9a9943645a956dc36068e2abefa31fe2e28626170d2b6
                                                    • Opcode Fuzzy Hash: 6c9cf0f4e773748aef2295a3126ef5d9376f2b22f4ef2bb222f74cc4e0dddb4a
                                                    • Instruction Fuzzy Hash: 3101DF725003409FDB10CF59D885B96FBA8EF51324F08C4ABED098B346D271E858CAA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592153704.0027A000.00000040.00000001.sdmp, Offset: 0027A000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_27a000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID: CloseHandle
                                                    • String ID:
                                                    • API String ID: 2962429428-0
                                                    • Opcode ID: e3157ad681e2f93aaefc0a49803f2c1c1265e3172c8ef6644b61d03d54812460
                                                    • Instruction ID: 3116c20d54c12051599b5bd3229ae70795eaba08effeb2dc9154e438e42d2726
                                                    • Opcode Fuzzy Hash: e3157ad681e2f93aaefc0a49803f2c1c1265e3172c8ef6644b61d03d54812460
                                                    • Instruction Fuzzy Hash: A901DF755113409FEB118F56D88976AFB98EF12320F08C4AAEC098B306D775E818CAA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.03%

                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: 5<U
                                                    • API String ID: 0-2345730039
                                                    • Opcode ID: 012361a594635fea9cc838ce22a2eaa5cc7783d002826c69154c7f57fa1da7cf
                                                    • Instruction ID: 08b6ccd310a4eaec9de5e3ae9b0c6458e84f2ded067fc365242c9d751fa4caac
                                                    • Opcode Fuzzy Hash: 012361a594635fea9cc838ce22a2eaa5cc7783d002826c69154c7f57fa1da7cf
                                                    • Instruction Fuzzy Hash: 63F0B479314169DBDF208E1988613AC31EB6BC4205F69C42AB5C596189D23CCA85FF91
                                                    Uniqueness

                                                    Uniqueness Score: 100.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c5736ce8c0d1674b1ad007a9c70167b2dc4da5179f3e0bbb11a3669f893d7b0a
                                                    • Instruction ID: a30ef7b6a35bfca9727059c828468ec078b2631f65b64bb8c055448c5c0e4f0e
                                                    • Opcode Fuzzy Hash: c5736ce8c0d1674b1ad007a9c70167b2dc4da5179f3e0bbb11a3669f893d7b0a
                                                    • Instruction Fuzzy Hash: 0461E334B111089FCB04EBA5DC815BDB7A2EFD8304B50893AE906E73A4DF34DC569B91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8071ae7cca00306208865b2fba459eaa45cfb64075389ad6d79b58d6dc1f3032
                                                    • Instruction ID: fab5553047aa39eec48dd6a10add3e6e77e72d4183a88d28881de820b86f827e
                                                    • Opcode Fuzzy Hash: 8071ae7cca00306208865b2fba459eaa45cfb64075389ad6d79b58d6dc1f3032
                                                    • Instruction Fuzzy Hash: 1461E734B11108CFCB04EBB5D8415ADB7A2EFD8314B50893AE906E73A4DF34EC569B91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: da8471f09aaf467ecea74b4b76bf3204a543944dd0cdee842035174bf72b03e4
                                                    • Instruction ID: 4fb6dca87c611e6699c7e77d75ab95cae7906b5301175b294383307d4ac0aed4
                                                    • Opcode Fuzzy Hash: da8471f09aaf467ecea74b4b76bf3204a543944dd0cdee842035174bf72b03e4
                                                    • Instruction Fuzzy Hash: 5051AF30E082488BDB18DBB8D8413BD7AE7ABC8314F249439E509FB290DBB58C44CB55
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 217564f2df3662ddec53e51fd9110d5b5e1f17ff7c0e3e6533eddca0c464e011
                                                    • Instruction ID: b2949498f6a0068e2d1d200bc71a8bab252037f2b6ee6149372a4b368b22b08f
                                                    • Opcode Fuzzy Hash: 217564f2df3662ddec53e51fd9110d5b5e1f17ff7c0e3e6533eddca0c464e011
                                                    • Instruction Fuzzy Hash: 0951AC71B102098FCB48DBB8C8401EEB7E6AFD5208B50457AC10AEB364EB758D52CB81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fe3e8ce1cb53ee7e3f8f8a5fbf8bdc95f5936ddac2144abaa5d088a7c2c04575
                                                    • Instruction ID: b936d7ffbd1aae975f95346f690570fe736c695acd6981cb69b921a33df2fb87
                                                    • Opcode Fuzzy Hash: fe3e8ce1cb53ee7e3f8f8a5fbf8bdc95f5936ddac2144abaa5d088a7c2c04575
                                                    • Instruction Fuzzy Hash: 4E41A030E082489FDB14DBB8E8547AD7AF3ABC5314F24942AE509BB291DBB58C44CB54
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e9ed76ae69da89584d95b6f2c324ea289e3244e71a0e376acc6c3ff12547282d
                                                    • Instruction ID: 59861495a24119773749ee66d88119c9c0941b27d71dfa2abe03ee5f94110eed
                                                    • Opcode Fuzzy Hash: e9ed76ae69da89584d95b6f2c324ea289e3244e71a0e376acc6c3ff12547282d
                                                    • Instruction Fuzzy Hash: 044128B1B002088BDB08DAB988507BEB6E6AB88304F60543AE705FB3D1EF38CC118755
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 573d0a8504e008235e971f6b6f527fb91312c8cd10ed79d4c567a222617debaf
                                                    • Instruction ID: 6c38aa1456c5e9a872ccc4deee4912368f697d3e8f039ad9352bf3b994a44422
                                                    • Opcode Fuzzy Hash: 573d0a8504e008235e971f6b6f527fb91312c8cd10ed79d4c567a222617debaf
                                                    • Instruction Fuzzy Hash: 86415E70A0010ECB8B08CBA8D6918BDB7B2FF993447359526D615EB760DB35EC928B91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c1e6bb1e9417068bb75f4de27489f63ffba301b5a044543763678634ba56320e
                                                    • Instruction ID: 50ea00cef767092a49ca51755e2629d5b61b6fede7f3955a513663736a62610b
                                                    • Opcode Fuzzy Hash: c1e6bb1e9417068bb75f4de27489f63ffba301b5a044543763678634ba56320e
                                                    • Instruction Fuzzy Hash: 5E418F34A10208CFDB54CFA4C9909ADBBB6FF99314F158569D509EB365DB34EC52CB80
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2151df99feaff8ac064c51df4c60d814f9ed8fda9b87eda3fd5551367d9b0e2b
                                                    • Instruction ID: bca162f482bfc7eda6ea53810982987bdf47d087a0177ff0d090a027d515d2ff
                                                    • Opcode Fuzzy Hash: 2151df99feaff8ac064c51df4c60d814f9ed8fda9b87eda3fd5551367d9b0e2b
                                                    • Instruction Fuzzy Hash: 75416A34A10209CFDB14CFA8D9909ADFBB6FF99314F148566D609AB364DB30EC52CB80
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2c2360715119917e2172ba2831ad8a6009f2782fbcbcbfd01084a3b559bcc8b6
                                                    • Instruction ID: 6d085280de63ae2288aa10f6c28244719d18b537e75a558324fe6c348862d10e
                                                    • Opcode Fuzzy Hash: 2c2360715119917e2172ba2831ad8a6009f2782fbcbcbfd01084a3b559bcc8b6
                                                    • Instruction Fuzzy Hash: 19317EB6509340AFC750CF05EC41A57FFE8EB85620F04C86EF9499B352D275A908CBA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c82d8296d6b69989181818d89900e66f72a62e5c1522a278449f99d5bd1f2570
                                                    • Instruction ID: f1f87d855a1d15957272d735ed2fbb01f72f93684bbc46322104fca19b43e567
                                                    • Opcode Fuzzy Hash: c82d8296d6b69989181818d89900e66f72a62e5c1522a278449f99d5bd1f2570
                                                    • Instruction Fuzzy Hash: 1B314B34B102088FDF04DBA8D5908ADB7A6EF99328B64D575D609AF365DB30EC42CB81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1caf0126d407d67c0034201e4dffd21a113b6e417e9b26aa3adaa5a42c78ea6c
                                                    • Instruction ID: e25843a52be1a43523d1ebaed9714c86a4ea6616494459743a222af2f58c149f
                                                    • Opcode Fuzzy Hash: 1caf0126d407d67c0034201e4dffd21a113b6e417e9b26aa3adaa5a42c78ea6c
                                                    • Instruction Fuzzy Hash: 96319E34B002088FCB04CFA8D5909ADB7B2FF99324B25D669D509AF3A5D634EC06DB40
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: df8fc7f59abf30638d484bea0829af5d95547c64c4d65e33472272a4234d1d1f
                                                    • Instruction ID: f5cc59ebca2ae61a7d647b517aa45ec80a6da2b01a6844094ab97bc8eec8c2c8
                                                    • Opcode Fuzzy Hash: df8fc7f59abf30638d484bea0829af5d95547c64c4d65e33472272a4234d1d1f
                                                    • Instruction Fuzzy Hash: D921A070A04158DFDB44DBB8D810AAEB7F6AFA8700F10813AE606EB795DB34DD01CB91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 483a3947143cdd3371002f3da12e265cee87db160dd3d37e8cd9bcfcb605ecac
                                                    • Instruction ID: 2b32f1939da5baaac915c18ceeb7dee17c7a071eaf869bb139bcf76589e982e6
                                                    • Opcode Fuzzy Hash: 483a3947143cdd3371002f3da12e265cee87db160dd3d37e8cd9bcfcb605ecac
                                                    • Instruction Fuzzy Hash: 3521EFB1F5015C8BDB44CBB9D9415AFB7B6ABC8310F608436D606E7390EB308C168B81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c6cba2b5fd7d77e34897399c53ba91555b84832a8988e4f5e23f05f97de6c0cd
                                                    • Instruction ID: c2eb559bc42efe3ad13b165f772e94baa19eac4dc1d155ce3e6d1e6835f4bad0
                                                    • Opcode Fuzzy Hash: c6cba2b5fd7d77e34897399c53ba91555b84832a8988e4f5e23f05f97de6c0cd
                                                    • Instruction Fuzzy Hash: 00219032B041488FCB14EA7898546EE7BF29B99324B24057ED606FB391EB35DC05C7A5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4027a04e401f743d1f545abb41e441a4093900f54028c6f90efc3f1431822501
                                                    • Instruction ID: 94ebb4636e9f7da95dde644f529fe41cbb76c5b45f866d8379900e2009712479
                                                    • Opcode Fuzzy Hash: 4027a04e401f743d1f545abb41e441a4093900f54028c6f90efc3f1431822501
                                                    • Instruction Fuzzy Hash: 542130B6508304AFD750CF0AEC41A57FBE8EB89670F14C82EFD4997311E271E9148BA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 27d5ea068c2689956df43eb200a5ec70f6cb51c2fe105a4e3bab5827e5f64b89
                                                    • Instruction ID: 58321b34caf858a96d05258971c1cfcb6ee4bd14dc8355921b0b620897825c89
                                                    • Opcode Fuzzy Hash: 27d5ea068c2689956df43eb200a5ec70f6cb51c2fe105a4e3bab5827e5f64b89
                                                    • Instruction Fuzzy Hash: 5A210838B102088FCF04CB98D5808ACB7B2EF99324B24D565D919AF365DB30EC46CB80
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b977047ac537175e986658a3e5a79b8ca35cbbf95785df9b28d6477fd0657478
                                                    • Instruction ID: 2884b4f7dd8640cfe790f94b81028c5a161a6fcab2fdc9c0153dc0d8a56c4f7e
                                                    • Opcode Fuzzy Hash: b977047ac537175e986658a3e5a79b8ca35cbbf95785df9b28d6477fd0657478
                                                    • Instruction Fuzzy Hash: 48213470F541588FD748CB7999415BF77F29BC9350F64943ADA06E7390EA348C168B82
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: adff0b76a7e0b00ee94c12354c578efc1cc87b03edc8df6f0f78472635932610
                                                    • Instruction ID: b763707055d78001a8adc6e6722b35258c37e961b72b5a328b28ab9e9153a506
                                                    • Opcode Fuzzy Hash: adff0b76a7e0b00ee94c12354c578efc1cc87b03edc8df6f0f78472635932610
                                                    • Instruction Fuzzy Hash: E2212571B5015ACFCB08CF79D9410ABB3B2EBC53407A08836D516EB694EB30DD56CB82
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d4e35489a9fdb3d8ed01c6c83fa5fee053bfaeb4f501427a7a08d5a423b3ccb8
                                                    • Instruction ID: aedec644108120bfe22e531d8fb889728c1a535301b8b3bf56c4ffffa0eab572
                                                    • Opcode Fuzzy Hash: d4e35489a9fdb3d8ed01c6c83fa5fee053bfaeb4f501427a7a08d5a423b3ccb8
                                                    • Instruction Fuzzy Hash: F0116031B041188FCB44EBB8D8915EFB7F2AB88320B604078E149F7391EE359D518BA0
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6c104acb882668500574a521f64c16ede9dfdc72a1ea0dd84f605a7189a54abd
                                                    • Instruction ID: a1c65781d89a25c7c4549c0ef2be2bc550fd4d3a1c46b04bae134c6938a09249
                                                    • Opcode Fuzzy Hash: 6c104acb882668500574a521f64c16ede9dfdc72a1ea0dd84f605a7189a54abd
                                                    • Instruction Fuzzy Hash: AB212A39B102098FCF04DBA8D5808ADFBB6EF99324B15D566D509AB365DB30EC52CB81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 80d308997bf7aa4c8d30bfd2c356199778f988852a3aac9f6d1bc4b4b935a678
                                                    • Instruction ID: d5e3e9513a84b052bdf83e9ff1283dac0e12c3bbe2f9e46aef1de74f2c0e8cbe
                                                    • Opcode Fuzzy Hash: 80d308997bf7aa4c8d30bfd2c356199778f988852a3aac9f6d1bc4b4b935a678
                                                    • Instruction Fuzzy Hash: 5E110270F141686FDB089A789C247BF36E29BD4350F284A39E506E7380EE788D1583D1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e3636ebb60370f8f979e914a5567dd3914b97d37a923d0dcfbeb588095d43f49
                                                    • Instruction ID: 426d7fa7abcb6bb2ba2f00ccc1e5e270840ad08883dd6f1c6b13fbd15b05dfbb
                                                    • Opcode Fuzzy Hash: e3636ebb60370f8f979e914a5567dd3914b97d37a923d0dcfbeb588095d43f49
                                                    • Instruction Fuzzy Hash: C9115C31F041088FCB44EBB8D8915EEB7F2ABC8320B204078E209F7391EE359C018BA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8c7e4ef6a56065043f1b962a1b62c766fe36798ae3a9fb99d2a80424e2984749
                                                    • Instruction ID: 20b5b493733635fdf92df16d052e49e87421665a04283882017786cb7bc673b4
                                                    • Opcode Fuzzy Hash: 8c7e4ef6a56065043f1b962a1b62c766fe36798ae3a9fb99d2a80424e2984749
                                                    • Instruction Fuzzy Hash: 08116D31B040084FCB44EBB8E8616EE77F2ABC8320B644479E109F7392EE359D1587A1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 00b00621893c32e17fc86747ad126d9451a3731718115d75fca35da6e88ee054
                                                    • Instruction ID: c3983700a2b3988869388ba159a1e163fb6c10dde1cd3ccebd950e7f7aa5865e
                                                    • Opcode Fuzzy Hash: 00b00621893c32e17fc86747ad126d9451a3731718115d75fca35da6e88ee054
                                                    • Instruction Fuzzy Hash: 92117231B001088FDB44EBB8E8515EFB7F2ABC8360B205479E149F7391EE355D458BA5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 11ffa64c9caa1191c06300870d4aa9e793d2250f996f1a8b44e81372ce92c02b
                                                    • Instruction ID: 01e5e2960111e47f44bed8680e6d05e6a20f42bf2bbf0538fc25b539f0d888b2
                                                    • Opcode Fuzzy Hash: 11ffa64c9caa1191c06300870d4aa9e793d2250f996f1a8b44e81372ce92c02b
                                                    • Instruction Fuzzy Hash: 11116D31B001488FCB44EBB8D9519EEB7F2ABC8360B205039E109F7392DE359D118BA5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 74324c716bdd629d812b58c42f7b95f391f657ac684274788c2a41db66d5cded
                                                    • Instruction ID: 2559741e1c0be7c6fdc463dc8f671273a43b8227bc2179a9df2ef96bda2f641f
                                                    • Opcode Fuzzy Hash: 74324c716bdd629d812b58c42f7b95f391f657ac684274788c2a41db66d5cded
                                                    • Instruction Fuzzy Hash: 7A114F31B141088FCB44EAB8D8916EEB7F2ABC8350B644039E109F7391EE359D558BA5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f7606c7f7b123a157e6a1b57415fdec4f4a215c9e8584dfbd952aef1b15b17fd
                                                    • Instruction ID: e109636b23a83eaafb7ec95a098c5748a60641cbeccda342838feccb49a10c25
                                                    • Opcode Fuzzy Hash: f7606c7f7b123a157e6a1b57415fdec4f4a215c9e8584dfbd952aef1b15b17fd
                                                    • Instruction Fuzzy Hash: 1A116030B041088FCB44EBB8D9A15EFB7F1AB88314B104479E14AF7391EE319C418B91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 82b782978973b340135934f9ee8763acfc4889ef6206b5507a77c98cd311d9ba
                                                    • Instruction ID: 0d9fc62cbb4a481bd6f6f793281992b56243a5e128024127c4d60074dd634050
                                                    • Opcode Fuzzy Hash: 82b782978973b340135934f9ee8763acfc4889ef6206b5507a77c98cd311d9ba
                                                    • Instruction Fuzzy Hash: 1721E2B5508341AFD340CF19D881A1BBBE4FF89660F04896EF888D7311E271E908CFA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cd512451b25cbb0ccbbb05d7e998dbf9e8cc582226eec2bb92506cc49efba46f
                                                    • Instruction ID: 1ab0a739f6e5e01ef8fa06dbf49ec16cdb431fd72aa62116a55ad19ec6fa803d
                                                    • Opcode Fuzzy Hash: cd512451b25cbb0ccbbb05d7e998dbf9e8cc582226eec2bb92506cc49efba46f
                                                    • Instruction Fuzzy Hash: 67115E31B101088BCB44EBB8D8516EE77F2AFCC360B605439E149F7392EE759D5187A5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f2929833b468a32cb0c00c8e42f1a00cb552a50816dc86f4c71cbd1ae648ba3b
                                                    • Instruction ID: df648a314b71bcbf07e04553a653be370faf50ab6d33687125516b6bcd6b627d
                                                    • Opcode Fuzzy Hash: f2929833b468a32cb0c00c8e42f1a00cb552a50816dc86f4c71cbd1ae648ba3b
                                                    • Instruction Fuzzy Hash: 9011B8B5508301AFD340CF19D881A5BFBE4FBD9664F04896EF898D7311E231E9148FA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d19fa799e3e093d744c3c2808579183ad19d723b0242e35e1632d7f4b6f6de2f
                                                    • Instruction ID: 77fc1baf8ce29a8afc1cbb940b43b5a18bb661116cfe73cb3a593ab171f84933
                                                    • Opcode Fuzzy Hash: d19fa799e3e093d744c3c2808579183ad19d723b0242e35e1632d7f4b6f6de2f
                                                    • Instruction Fuzzy Hash: 82115171B0010C8B8B44EBB8E9516EFB7F6ABCC360B605438E109F7391EE359D5187A5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 04a8ee7ba2d3657050ceb94047d5bdb38b9dbee618ae8423114040cb571d313d
                                                    • Instruction ID: 34332eb59ed60ffd70943a6119710e67d8e7e02d1cacba18087d3849b4ec66e5
                                                    • Opcode Fuzzy Hash: 04a8ee7ba2d3657050ceb94047d5bdb38b9dbee618ae8423114040cb571d313d
                                                    • Instruction Fuzzy Hash: 4F114F71B001088B8B44EBB8D9516EEB7F6ABCC360F605038E109F7391EE359C458BA5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2683bc2309980d08ea6b87d433db4c5f761a4329de727444568720f22b6e0a9d
                                                    • Instruction ID: 2901252bb53e7ba51ae4831e661f97b52305f5d01d35f95a6d9f7d1968ffd442
                                                    • Opcode Fuzzy Hash: 2683bc2309980d08ea6b87d433db4c5f761a4329de727444568720f22b6e0a9d
                                                    • Instruction Fuzzy Hash: 17114F31F000088BCB44EBB8D9516EEB7F2ABCC320B605078E209F7391EE359C018BA5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dc4558791ffd2f515d7ed547fe015774f1ea43a71c34c0de29b59b5546557927
                                                    • Instruction ID: 39d407dfa42233ed3d001a7f01ed9434927086fdd28e665725fd1547e33a98f7
                                                    • Opcode Fuzzy Hash: dc4558791ffd2f515d7ed547fe015774f1ea43a71c34c0de29b59b5546557927
                                                    • Instruction Fuzzy Hash: D4111F31B1050C8BCB44EBB8D8916EEB7F6ABCC360B605439E109F7391EE359C5587A5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 50f51e79c21af3c678e735697a8875a839f286d42733b2e86247f28eb7ccebf8
                                                    • Instruction ID: 0223f55e6f5d4928087ee4fd7a0be5af2d6de985d6a68fee8bdf2145fa0ff05b
                                                    • Opcode Fuzzy Hash: 50f51e79c21af3c678e735697a8875a839f286d42733b2e86247f28eb7ccebf8
                                                    • Instruction Fuzzy Hash: 59114C71B000088B9B44EBB8E8516EFB7F2ABCC360B605439E109F7391EE359D458BA5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9621c63ebfea49d79e163712471454d7c03efb9ed90759688172595f8d1a05e4
                                                    • Instruction ID: 0ae90a027feedf2360d49fd9b2aee5f4d87ff10ef0a80d28e37144c25d17d180
                                                    • Opcode Fuzzy Hash: 9621c63ebfea49d79e163712471454d7c03efb9ed90759688172595f8d1a05e4
                                                    • Instruction Fuzzy Hash: 5A115131F000488B8B44EBBCD9516EEB7F2ABCC360B605439E209F7391EE359D118BA5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 936c34d1c51164928a4a88a725c31b15c76b08bce52193f8316c4610bbac1866
                                                    • Instruction ID: 1d7bf3b0eeff7d8eaf28f09ffe26afac9e82088a12a5a3859e325b4578ba5d19
                                                    • Opcode Fuzzy Hash: 936c34d1c51164928a4a88a725c31b15c76b08bce52193f8316c4610bbac1866
                                                    • Instruction Fuzzy Hash: B8115171B001088B8B44EBBCD9516EFB7F6ABCC360B605438E10AF7391EE359C5587A5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b7159c0e53558df05e0c843a792786651f3258b9a287c427e4362dd40a8c566d
                                                    • Instruction ID: 7190bf3601724729951fbd3735bafdd5c8e49ef07b1043f180f08290b46be06c
                                                    • Opcode Fuzzy Hash: b7159c0e53558df05e0c843a792786651f3258b9a287c427e4362dd40a8c566d
                                                    • Instruction Fuzzy Hash: 7B115471B0010C8F8B44EBB8E8516EE77F2ABCD350B505039E109F7391DE359D0187A5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592103064.00220000.00000040.00000040.sdmp, Offset: 00220000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_220000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 83b6f71758c27ba8a48dd89fe12b540a787edb5ac41bf01c0c1a7b0c0f28b91a
                                                    • Instruction ID: 9c8c88c177e33bdd8c883136179940f3ca3bd39bdf3792b9f2e738180cc5178e
                                                    • Opcode Fuzzy Hash: 83b6f71758c27ba8a48dd89fe12b540a787edb5ac41bf01c0c1a7b0c0f28b91a
                                                    • Instruction Fuzzy Hash: 91110631128285EFC711CB90E9C0F26BB95EB99708F28C9ACE4490B653C777D863CA51
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 721d76994fc515525d439900a75318001eff736b8d11339032d45cc1280fe732
                                                    • Instruction ID: 54d5ad168b6724d7f4f4acac4ae5c9d1b3efbb90dc91b9a38f533fa0834e49d7
                                                    • Opcode Fuzzy Hash: 721d76994fc515525d439900a75318001eff736b8d11339032d45cc1280fe732
                                                    • Instruction Fuzzy Hash: 8A119730A012589FDB54DF74D8947AA7BB2AB8A300F5004BDE149E7340DB798E94CF11
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a1526949f69550163ec5c98b4a04b4f0841207cb0d357866cd0cedd1bce106d7
                                                    • Instruction ID: 9ff737b9906277cb0bc10b590225a0369b30069729643991b461b8be8cf0d741
                                                    • Opcode Fuzzy Hash: a1526949f69550163ec5c98b4a04b4f0841207cb0d357866cd0cedd1bce106d7
                                                    • Instruction Fuzzy Hash: DE21F734A103098FCB44CB94D5908ADF7B6FF99314B15D565D909AF369CB34EC42CB80
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592103064.00220000.00000040.00000040.sdmp, Offset: 00220000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_220000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3d426ffa17e6e0f74a9e5559e713f70e1a878b9c9c05cc0af329bce3379bed58
                                                    • Instruction ID: 2b239f06ee2a11c3cd4f9363d4c3d9f4a8388d1a55ac2e60aeb4ab770ca3778e
                                                    • Opcode Fuzzy Hash: 3d426ffa17e6e0f74a9e5559e713f70e1a878b9c9c05cc0af329bce3379bed58
                                                    • Instruction Fuzzy Hash: 11219A311492C19FC713CB60D890B55BFB1EB47314F298AEED4884B6A3C33A9853DB41
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8279e26e13d65bdf71b7b20d7c071be1aff0ea477904dad2115098c484d5e631
                                                    • Instruction ID: b517affc21a0e25d1438398aff1923839ec4b0ba3dbee22a33a82016953b5061
                                                    • Opcode Fuzzy Hash: 8279e26e13d65bdf71b7b20d7c071be1aff0ea477904dad2115098c484d5e631
                                                    • Instruction Fuzzy Hash: 9B110231E10400CBCF14AB6CE5651ADB7BABF98314F14886AE19A97658DB31CC66CB91
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 20a40abc7e76f1ea2f70c60ffb7d3af91c1558d880b978a5f2bed036ef83a269
                                                    • Instruction ID: defb2d77a29dd007c9b2eb7a62b8be711d0dbc88881273182bbc7d037d92efaf
                                                    • Opcode Fuzzy Hash: 20a40abc7e76f1ea2f70c60ffb7d3af91c1558d880b978a5f2bed036ef83a269
                                                    • Instruction Fuzzy Hash: 54210334A102098FCB44CB98D9908ADFBB6FF99324B15D566D909AF369D734EC42CB80
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a9998f28bc71595eca41ebc5a9d2952b0aaf0b5368c0f2f83ea2ebf9badb6e7f
                                                    • Instruction ID: 19e20d089b2d1fb17828bf8e321a7a3efb7a3db89eeb39275bc48463961498d9
                                                    • Opcode Fuzzy Hash: a9998f28bc71595eca41ebc5a9d2952b0aaf0b5368c0f2f83ea2ebf9badb6e7f
                                                    • Instruction Fuzzy Hash: 5511E734A10209CFDB44CB94C5908ADBBB6EF99324B15D5A5D909AF365DB34EC42CB80
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fbee9189d049f26c6dc98a59db7a4bff1b24362d1108307df5bb4078c29c5ed5
                                                    • Instruction ID: dc9427e25b66fe4ac3d329585841fe1579da6e810c0477aaa3ea2cc7102a8e32
                                                    • Opcode Fuzzy Hash: fbee9189d049f26c6dc98a59db7a4bff1b24362d1108307df5bb4078c29c5ed5
                                                    • Instruction Fuzzy Hash: 12110231E00400CBCF14AB6CA5661ADB7F6AB8C314F14886AE19697658DB31CC66C791
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1065f261fcf0766d82242a70ebca4339fb6ad0cdeb83e830bf047df824089374
                                                    • Instruction ID: 8f15a9698f1f5cdc7acfa0e410ca8fe2c653136877db837caf72c8d10874ddbb
                                                    • Opcode Fuzzy Hash: 1065f261fcf0766d82242a70ebca4339fb6ad0cdeb83e830bf047df824089374
                                                    • Instruction Fuzzy Hash: 1A11FAB5508301AFD750CF09DC85A5BFBE8EBC8660F04882EF95997311E271E908CFA2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 84bf54884bb5fc846f4292d5a1ee3f048eab939d159bf63867ce236dd32d091b
                                                    • Instruction ID: 31338fd3c410b1d1bee4226a934ba7e49136e1951ad50688650243ec5db619a3
                                                    • Opcode Fuzzy Hash: 84bf54884bb5fc846f4292d5a1ee3f048eab939d159bf63867ce236dd32d091b
                                                    • Instruction Fuzzy Hash: AA01F535B042148FCB04E6F894601BDB7969FD4208B25943ACA06EB391EF31DC22DB66
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5169c25155a72fb7ce41149f4e19d6d18883dcb6dc7de219ad656847157d58d9
                                                    • Instruction ID: 4feabfc470e4d49541c7d5820be8662d67032c4caa32d6e3babe04c3edfeef0d
                                                    • Opcode Fuzzy Hash: 5169c25155a72fb7ce41149f4e19d6d18883dcb6dc7de219ad656847157d58d9
                                                    • Instruction Fuzzy Hash: D2115A71B04019CBDB04CBA8D950AAEB3B6EBA8700F259165D706FB795DB30DD40CB95
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 487af39ddf774ab01de3d79441dbc30ef3492108e6e4a7c8da18cc8a4553f5fd
                                                    • Instruction ID: feeaf966d9d596f72d80556101b0c9eaba7db6e98921a40bf286884a9a1ac4db
                                                    • Opcode Fuzzy Hash: 487af39ddf774ab01de3d79441dbc30ef3492108e6e4a7c8da18cc8a4553f5fd
                                                    • Instruction Fuzzy Hash: 60017CB1B0035C8BDB149FB8D8506DEB7BABB89304F10443ED606EB385DA329C15CBA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 535961504b47175ad67daba64cb06eba674395efad9674462d4b8e90b8c136c9
                                                    • Instruction ID: 9ed5d5bb3f64616dbd423193b0be992e465f711efd34725a0516efbae7f6fc68
                                                    • Opcode Fuzzy Hash: 535961504b47175ad67daba64cb06eba674395efad9674462d4b8e90b8c136c9
                                                    • Instruction Fuzzy Hash: 3201693158A350AFC75B9F7498555E63FF0EF5332431A21EEE846CB271E2660906CF60
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592103064.00220000.00000040.00000040.sdmp, Offset: 00220000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_220000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: af8882266257e23e4f0f5e1e53d26fb07163577ebdcb2f69148eb66ed2803123
                                                    • Instruction ID: ad93ecee2881e07423bcd5dedaf32163e38fc7b8a8649d1da93cbeb7edf17d18
                                                    • Opcode Fuzzy Hash: af8882266257e23e4f0f5e1e53d26fb07163577ebdcb2f69148eb66ed2803123
                                                    • Instruction Fuzzy Hash: 1F0186765097806FD7128F159C45862FFB8DE86530709C4AFEC498B712D225A909CBB2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 06115dd8c6b82520cc3564b753f80d0f18d15abcfe5e66073b6693db88e793de
                                                    • Instruction ID: 795b77db978594b94ff0b621c086fb20656659aa3304825111caf89241128146
                                                    • Opcode Fuzzy Hash: 06115dd8c6b82520cc3564b753f80d0f18d15abcfe5e66073b6693db88e793de
                                                    • Instruction Fuzzy Hash: 5D01D470A093D88FD7568BB4886466EBFB6BB87300F0540BFE585DB297DA344C04C7A2
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 41a490c0a832ec70c66627b0fda415e9d2218ea1bec1064238d9866cdf3fd3a8
                                                    • Instruction ID: 42daced231b785cda75ec04371595aa7173422761aa19933d4c08a9ded9bf943
                                                    • Opcode Fuzzy Hash: 41a490c0a832ec70c66627b0fda415e9d2218ea1bec1064238d9866cdf3fd3a8
                                                    • Instruction Fuzzy Hash: 6A01A1B1E1010DAFDB05EFD4E9519EEBBF9AB48310F20503AB119F7351DA7459448F24
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ef0a8b4d6836c9110f0a9e5b5d422befeed3ada4f42ec1e6ba24377b12f11846
                                                    • Instruction ID: 7acd1388869b6f6cf8d987a2aaedf1af91f229f3fb0d10d2d2ac8ee90f4e5a8f
                                                    • Opcode Fuzzy Hash: ef0a8b4d6836c9110f0a9e5b5d422befeed3ada4f42ec1e6ba24377b12f11846
                                                    • Instruction Fuzzy Hash: 9EF02270B002088BDB08AB399DA06BE32A2AFE5304BA40939D20DE7381EE74CD589751
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 91faa20e29828a8934139df84278251b05ef637579fac3562cdedf56119a4707
                                                    • Instruction ID: 67fb452b69ee513cad8fb84b2eafafb6626a950ed39b23065bf0b09b17d13fce
                                                    • Opcode Fuzzy Hash: 91faa20e29828a8934139df84278251b05ef637579fac3562cdedf56119a4707
                                                    • Instruction Fuzzy Hash: D3F0E974B001048BEB08677959243BE21D3AFF9304B684838D64AFB384EF74CD549792
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ca4a79d662e93606aaca607f5c438cae6a0aeecd793fb9ff24890104c19dd154
                                                    • Instruction ID: 808ce84518cd0e098d269126b6c1510b2301e5d7c2ac374c1f04d792b5074cf1
                                                    • Opcode Fuzzy Hash: ca4a79d662e93606aaca607f5c438cae6a0aeecd793fb9ff24890104c19dd154
                                                    • Instruction Fuzzy Hash: 78F0B431F150688B4F04EBF895511ECB7A69F843187209176D62AFB351DF318D128BA5
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592103064.00220000.00000040.00000040.sdmp, Offset: 00220000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_220000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 46debe57896ac666fbdd8b357651a768cc350afad20f7cf280d2b96e708a9c95
                                                    • Instruction ID: 4ab446cc36cd2600197c49097fc85458ebf935447c00722ba5c0a2b6adb98646
                                                    • Opcode Fuzzy Hash: 46debe57896ac666fbdd8b357651a768cc350afad20f7cf280d2b96e708a9c95
                                                    • Instruction Fuzzy Hash: 09F01D35154645DFC316CF40D580B16FBA2FB89718F24CAADE9490B762C737E823DA81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 01dc3f2fa9f558ebcab2b37f21f28bc9c9aa7637a147c5e41b311525d1d28326
                                                    • Instruction ID: 85d3063e5f8e6ae415bdbb3c699a4a4feb09dd311b6695cdbcde840ecb09e816
                                                    • Opcode Fuzzy Hash: 01dc3f2fa9f558ebcab2b37f21f28bc9c9aa7637a147c5e41b311525d1d28326
                                                    • Instruction Fuzzy Hash: 02F0F836B000488B8F44EBA8E5915EDB7F2ABC8224B609075E109F7352EE319C568B10
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4a48b0c8da1f76649ebe6a048b240e383be3c4416535cedb54e62f2ee5cba73c
                                                    • Instruction ID: 76d38bb270f3563d802df8a99b0dc6df3049d2d3f237193d155a1b7a38f00166
                                                    • Opcode Fuzzy Hash: 4a48b0c8da1f76649ebe6a048b240e383be3c4416535cedb54e62f2ee5cba73c
                                                    • Instruction Fuzzy Hash: C3F0F836F000488B8F44EBB8E5915EDB7F2AFC8228B609075E209F7352EE329C118B10
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 82d0b008f50368b151b72c9ce86f49895c28bec3909c7abdcaa755ea2f970a20
                                                    • Instruction ID: 4ca50a0e02f98cb844e343e2fa284df2b91be98248ebc37468c235cfb615e56a
                                                    • Opcode Fuzzy Hash: 82d0b008f50368b151b72c9ce86f49895c28bec3909c7abdcaa755ea2f970a20
                                                    • Instruction Fuzzy Hash: FCF0F836B000488B8F44EBB8E5915EDB7F2ABC8224B609075E109F7362EE319C158B50
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 62d607baca993276ab41e1aab102151331789f2462edcbf3705b5635635845d7
                                                    • Instruction ID: 283932b9c9e4f6bb69f8490b6f4a1419b496651f98313395431b4d723e56de08
                                                    • Opcode Fuzzy Hash: 62d607baca993276ab41e1aab102151331789f2462edcbf3705b5635635845d7
                                                    • Instruction Fuzzy Hash: 19F0F836F000088B9B44EBF8E5915EDB7F2ABC8224B609475E109F7362EE319D158B15
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6afca40c71bdc17134808b7370115f7787150d4a71575462d69692985f81a047
                                                    • Instruction ID: edb334cfc3b30ed91f7b8525b13976faba8fa878ba88484f40b902e1bc22eff2
                                                    • Opcode Fuzzy Hash: 6afca40c71bdc17134808b7370115f7787150d4a71575462d69692985f81a047
                                                    • Instruction Fuzzy Hash: 46F0F836F000488B8B44EBB8E5915EDB7F2ABC8328B609079E109F7352EE319D118B25
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d4448d359d55759ff7646014daf6202ee9932916ce045ffbb7c56435b0bb81fd
                                                    • Instruction ID: 5f4651a9b5b2674ac3501f5e82a3600c01dc0bac0db42b9198ffd4c8a2ef00cf
                                                    • Opcode Fuzzy Hash: d4448d359d55759ff7646014daf6202ee9932916ce045ffbb7c56435b0bb81fd
                                                    • Instruction Fuzzy Hash: B6F0F835B000488B8F44EBA8E5915EDB7F2ABC8224B609075E109F7352EE319D158B10
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fad13522f684ff8318da042861395b4615b777a736dc1efe0cb3fac85fe33403
                                                    • Instruction ID: 47544053169ecd29585c1cf0fc0b06d963a0ead83eafe13beea9aa24d33d58fd
                                                    • Opcode Fuzzy Hash: fad13522f684ff8318da042861395b4615b777a736dc1efe0cb3fac85fe33403
                                                    • Instruction Fuzzy Hash: 70F0F875B000488F8F44EBB8E9915EDB7F2ABC8224B609075E109F7362EE359D158B11
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 7d50794888cad913f492d9b699027e4fb6940acfe4ffe9f924f37b91b1f98cc1
                                                    • Instruction ID: 4e006bd3f740acea24444149a5bd39ec879471a730a6191a2b2a74a4aabdbb45
                                                    • Opcode Fuzzy Hash: 7d50794888cad913f492d9b699027e4fb6940acfe4ffe9f924f37b91b1f98cc1
                                                    • Instruction Fuzzy Hash: E4F0F836B000488B8F44EBA8E9915EDB7F2ABC8224B609075E109F7362EE319C11CB65
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592103064.00220000.00000040.00000040.sdmp, Offset: 00220000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_220000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a12e90fcd2dc3bff5bffb77dc2f4937bcdc0f3db6754dabd5d28669fe687c2cc
                                                    • Instruction ID: 64dab13f41cdd1fe292349436ca2d074a4e35e538b1d3a94a0cee2deb1ac9f78
                                                    • Opcode Fuzzy Hash: a12e90fcd2dc3bff5bffb77dc2f4937bcdc0f3db6754dabd5d28669fe687c2cc
                                                    • Instruction Fuzzy Hash: 6CE092766007009F9A50CF0AEC42452F798EB84630B18C47FDC0D8B700E635F504CAA1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f0e1106d8e465b2d299432538d390c87797b4ea6ebbf792d0418f46afc8eaf00
                                                    • Instruction ID: 02106ec63f6350a7100262bc5cbc1e00df79f6005cc49a564444bee025f98932
                                                    • Opcode Fuzzy Hash: f0e1106d8e465b2d299432538d390c87797b4ea6ebbf792d0418f46afc8eaf00
                                                    • Instruction Fuzzy Hash: ECE0D8725403046BD6508E069C46B53FB98EB91931F08C567ED095B341E162B51489E1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d6e291873b8126eefef768bf9f90863b2618260ebe94240253a7fa128e94f635
                                                    • Instruction ID: 4eb4623562f2f1a00e2a17643d6da01709d626d30e4555f226a479a476a21c93
                                                    • Opcode Fuzzy Hash: d6e291873b8126eefef768bf9f90863b2618260ebe94240253a7fa128e94f635
                                                    • Instruction Fuzzy Hash: 24E0D8725003006BD2508E069C46B53FB98EB91930F08C467ED095B306E176B514C9E1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 48128ff2fc55cd99976f4415349580358c7f6c817d4ad32b1230670496c5a439
                                                    • Instruction ID: c36426a72bedcd13eaa7e8ec99204718d4a82d9597e8c1d69a752f0338910d4b
                                                    • Opcode Fuzzy Hash: 48128ff2fc55cd99976f4415349580358c7f6c817d4ad32b1230670496c5a439
                                                    • Instruction Fuzzy Hash: 97E0D8725003046BD2508E069C4AB53FB98EB91930F08C467ED095B302E172B51489F1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2a32e94109d522f7e24591c96fb71260c50015dee52abe13b5060bc34571df4c
                                                    • Instruction ID: 8cba74a45e111b6f64752f7578478fb7e482990817e1f59e4b3c1638395a0b3c
                                                    • Opcode Fuzzy Hash: 2a32e94109d522f7e24591c96fb71260c50015dee52abe13b5060bc34571df4c
                                                    • Instruction Fuzzy Hash: 96E0D8725403006BD2508E069C46B52FB98EB91930F08C467ED085B701E162B5148AE1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594100131.00EC0000.00000040.00000001.sdmp, Offset: 00EC0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ec0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 612cf213333232adb60d9ec5df661ef9327dec38aa4bd8bc896e3d0b51a4e1e7
                                                    • Instruction ID: 0c140eeafd75a5782fa5413e6ed144067fbc258aea51345d9743ea32c3800561
                                                    • Opcode Fuzzy Hash: 612cf213333232adb60d9ec5df661ef9327dec38aa4bd8bc896e3d0b51a4e1e7
                                                    • Instruction Fuzzy Hash: 1AE0DFB29003006BD2508F06AC4AB62FB98EBA1A30F08C46BED085B302E162B5148AE1
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3c74fd988652b3faf2818c9d10d9946e89ea55de18f619e3fbb99197f634b0eb
                                                    • Instruction ID: e22ecfc4cc6e64f56421858916591dd3d8c7085d1cfb22827f4855ce17e31c23
                                                    • Opcode Fuzzy Hash: 3c74fd988652b3faf2818c9d10d9946e89ea55de18f619e3fbb99197f634b0eb
                                                    • Instruction Fuzzy Hash: 29E02235F00144CFCB49EF3485A182FBBAA6FC5208B20545FDC47DF2A9D6308C01AA81
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: da5cf6f5c37a9a9c0024ff56755fee1b97fc6dad34d654f0c2444947800ec323
                                                    • Instruction ID: 50d83e1a90ce90828c76d6fa1f184047e22492b061865a5fd60dc67baaca3808
                                                    • Opcode Fuzzy Hash: da5cf6f5c37a9a9c0024ff56755fee1b97fc6dad34d654f0c2444947800ec323
                                                    • Instruction Fuzzy Hash: 5BE0DF30B403184BD304E7A0CC637EDB2679B8A304F308428960AFFB92C9B4EC401752
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f44bd6579e46dfde57373ad648550ff7059bf4063c8b11615f08f3e7c8951bd2
                                                    • Instruction ID: 0161a762c0b6b5554fb6f2b919f0def651c85aa5cf5de7f93863cd1e840e3416
                                                    • Opcode Fuzzy Hash: f44bd6579e46dfde57373ad648550ff7059bf4063c8b11615f08f3e7c8951bd2
                                                    • Instruction Fuzzy Hash: E6E05E70A000A98FCB48BBB4D86236E76A77BC4700F24557DA60EAF346CE348D556B66
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592144548.00272000.00000040.00000001.sdmp, Offset: 00272000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_272000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 86823b1b3d9e6b547844e4304d522c00e456ce454c54ecf6417ff0b6b0b161c3
                                                    • Instruction ID: 572f9e929778da6d9e5cc5a302da2e052c57a4f7fdc63609c620e0664f369445
                                                    • Opcode Fuzzy Hash: 86823b1b3d9e6b547844e4304d522c00e456ce454c54ecf6417ff0b6b0b161c3
                                                    • Instruction Fuzzy Hash: 3BD05E79215692CFD3168E1CC1A8B953B94AF92B04F4684FAE804DB6A3C378D9A5D600
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a1fedf0726cab42a352aa7aa3f62a4119c722afd564b8bfaed4be76031f125c3
                                                    • Instruction ID: 2da3026cb08d2b26ea206e95fbbd7b7fb6bb5bd84d119e5d4fba7d453a70805e
                                                    • Opcode Fuzzy Hash: a1fedf0726cab42a352aa7aa3f62a4119c722afd564b8bfaed4be76031f125c3
                                                    • Instruction Fuzzy Hash: 1AD023B071016DC7CF148B58847055D214F33C8304B19853FA547D334DD9308C029790
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.592144548.00272000.00000040.00000001.sdmp, Offset: 00272000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_272000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cad5a95a0f7c214587247b49f7e95e4af96d5b3e8a0809185200f0935add1617
                                                    • Instruction ID: 465514035d0d32d6c44ce4a6f5222299d0c79f09c281bc3b396bb33701ca3db1
                                                    • Opcode Fuzzy Hash: cad5a95a0f7c214587247b49f7e95e4af96d5b3e8a0809185200f0935add1617
                                                    • Instruction Fuzzy Hash: 5AD05E342105828BD715CF0DC294F5977E4AF81704F1684EDBC008B266C3B8DD94CB00
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594305031.01090000.00000040.00000001.sdmp, Offset: 01090000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_1090000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fd907982df40a0674acbbcb67bd799a667279c2a440c7e8068b99c124072399d
                                                    • Instruction ID: d840adf4ec64f61bc6911a909c7d72db0b40a6f79ae0feaefb4b5b1b3d96c772
                                                    • Opcode Fuzzy Hash: fd907982df40a0674acbbcb67bd799a667279c2a440c7e8068b99c124072399d
                                                    • Instruction Fuzzy Hash: ADC012316182244B8B08AAB9A0058A97BDCAA4962030000ABE50ACB711E9A2AC008B94
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Memory Dump Source
                                                    • Source File: 00000007.00000002.594139557.00EF0000.00000040.00000001.sdmp, Offset: 00EF0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_7_2_ef0000_NEW_INVOICE.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4bd80c55b4a528c3ef0badbbe0cb25443b9b4590074902f8d4a01b6338f87010
                                                    • Instruction ID: b269dea98cd59bab392971d24e36f8caa93287a0de482a8dc0fa2afb1ecb4d8c
                                                    • Opcode Fuzzy Hash: 4bd80c55b4a528c3ef0badbbe0cb25443b9b4590074902f8d4a01b6338f87010
                                                    • Instruction Fuzzy Hash: 28C08071B0414D9B57049AD884511FD35A15F5435CF702035D615FA700DD34DC83EB01
                                                    Uniqueness

                                                    Uniqueness Score: 0.00%

                                                    Non-executed Functions