Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Proforma Inv.exe

Overview

General Information

Sample Name:Proforma Inv.exe
Analysis ID:605000
MD5:189ad2733ba3c8baa0d9fb41e4223d92
SHA1:90d2762579dfd97d7b767662566f3a623766dd0a
SHA256:d73763f8b8d4eb91dec386eb7a2ebf9a8a9b40c6b028d57e6144ed74551d460b
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
.NET source code contains very large strings
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Sigma detected: Suspicious Outbound SMTP Connections
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • Proforma Inv.exe (PID: 6872 cmdline: "C:\Users\user\Desktop\Proforma Inv.exe" MD5: 189AD2733BA3C8BAA0D9FB41E4223D92)
    • Proforma Inv.exe (PID: 7096 cmdline: {path} MD5: 189AD2733BA3C8BAA0D9FB41E4223D92)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "ipdepartment@safalaw.com.ph", "Password": "#Risel767", "Host": "mail.safalaw.com.ph"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Proforma Inv.exe.3dff630.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Proforma Inv.exe.3dff630.2.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Proforma Inv.exe.3dff630.2.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x30d32:$s10: logins
                • 0x30799:$s11: credential
                • 0x2cd78:$g1: get_Clipboard
                • 0x2cd86:$g2: get_Keyboard
                • 0x2cd93:$g3: get_Password
                • 0x2e074:$g4: get_CtrlKeyDown
                • 0x2e084:$g5: get_ShiftKeyDown
                • 0x2e095:$g6: get_AltKeyDown
                2.0.Proforma Inv.exe.400000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  2.0.Proforma Inv.exe.400000.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                    Click to see the 19 entries

                    There are no malicious signatures, click here to show all signatures.

                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 207.148.117.199, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\Proforma Inv.exe, Initiated: true, ProcessId: 7096, Protocol: tcp, SourceIp: 192.168.2.3, SourceIsIpv6: false, SourcePort: 49756
                    Source: Process startedAuthor: frack113: Data: Command: {path}, CommandLine: {path}, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Proforma Inv.exe, NewProcessName: C:\Users\user\Desktop\Proforma Inv.exe, OriginalFileName: C:\Users\user\Desktop\Proforma Inv.exe, ParentCommandLine: "C:\Users\user\Desktop\Proforma Inv.exe" , ParentImage: C:\Users\user\Desktop\Proforma Inv.exe, ParentProcessId: 6872, ParentProcessName: Proforma Inv.exe, ProcessCommandLine: {path}, ProcessId: 7096, ProcessName: Proforma Inv.exe
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 0.2.Proforma Inv.exe.3dff630.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "ipdepartment@safalaw.com.ph", "Password": "#Risel767", "Host": "mail.safalaw.com.ph"}
                    Source: Proforma Inv.exeVirustotal: Detection: 33%Perma Link
                    Source: Proforma Inv.exeJoe Sandbox ML: detected
                    Source: 2.0.Proforma Inv.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.0.Proforma Inv.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.0.Proforma Inv.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.0.Proforma Inv.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.0.Proforma Inv.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 2.2.Proforma Inv.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: Proforma Inv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: Proforma Inv.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_0CC19A90
                    Source: Joe Sandbox ViewASN Name: AS-CHOOPAUS AS-CHOOPAUS
                    Source: global trafficTCP traffic: 192.168.2.3:49756 -> 207.148.117.199:587
                    Source: global trafficTCP traffic: 192.168.2.3:49756 -> 207.148.117.199:587
                    Source: Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://WaIJyp.com
                    Source: Proforma Inv.exe, 00000002.00000002.510827489.0000000002E33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://XudLs2COBNu.org
                    Source: Proforma Inv.exe, 00000002.00000003.279561854.0000000000C84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://XudLs2COBNu.org1-5-21-3853321935-2125563209-4053062332-1002_Classes
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: Proforma Inv.exe, 00000002.00000003.303946652.0000000000E39000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000002.00000003.303336669.0000000000E42000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000002.00000003.303909948.0000000000E24000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000002.00000003.303309343.0000000000E39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
                    Source: Proforma Inv.exe, 00000000.00000003.242880391.0000000005DB4000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242392348.000000000145D000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://en.w
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.safalaw.com.ph
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                    Source: Proforma Inv.exe, 00000000.00000002.278940493.0000000005D90000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                    Source: Proforma Inv.exe, 00000000.00000003.249428709.0000000005DC5000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249449455.0000000005DC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.html
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com=
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comF
                    Source: Proforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comL.TTF
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.248778008.0000000005D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.coma
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comab
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comalic#
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comals
                    Source: Proforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.248778008.0000000005D98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comasvi
                    Source: Proforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comcomF
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comd
                    Source: Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comion
                    Source: Proforma Inv.exe, 00000000.00000002.278940493.0000000005D90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comionFt
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comitua
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comt
                    Source: Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                    Source: Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comCH
                    Source: Proforma Inv.exe, 00000000.00000003.242919450.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comic
                    Source: Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comn
                    Source: Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.comoth
                    Source: Proforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.246769169.0000000005D9D000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244899824.0000000005D9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                    Source: Proforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/e(
                    Source: Proforma Inv.exe, 00000000.00000003.244517298.0000000005DCD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnu-ru
                    Source: Proforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cnudi
                    Source: Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cny
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                    Source: Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242919450.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comKfC
                    Source: Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comh
                    Source: Proforma Inv.exe, 00000000.00000003.242880391.0000000005DB4000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.coms
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                    Source: Proforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kre
                    Source: Proforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krights
                    Source: Proforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krnta~
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                    Source: Proforma Inv.exe, 00000000.00000003.243218227.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.243198712.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comcom
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                    Source: Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deFv
                    Source: Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                    Source: Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownDNS traffic detected: queries for: mail.safalaw.com.ph
                    Source: Proforma Inv.exe, 00000000.00000002.265427255.0000000000FEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 0.2.Proforma Inv.exe.3dff630.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.2.Proforma Inv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.Proforma Inv.exe.3dff630.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.0.Proforma Inv.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.0.Proforma Inv.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: 2.2.Proforma Inv.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bA239DB3Au002d643Cu002d4CE8u002dBEC1u002dDF30B6E801BDu007d/u00326037609u002d1026u002d40FDu002d9ECDu002dF6CF19F76457.csLarge array initialization: .cctor: array initializer size 11621
                    Source: Proforma Inv.exe, Form1.csLong String: Length: 22528
                    Source: 0.0.Proforma Inv.exe.960000.0.unpack, Form1.csLong String: Length: 22528
                    Source: 0.2.Proforma Inv.exe.960000.0.unpack, Form1.csLong String: Length: 22528
                    Source: 2.2.Proforma Inv.exe.680000.1.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.9.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.13.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.7.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.5.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.11.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.1.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.0.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.2.unpack, Form1.csLong String: Length: 22528
                    Source: 2.0.Proforma Inv.exe.680000.3.unpack, Form1.csLong String: Length: 22528
                    Source: Proforma Inv.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 0.2.Proforma Inv.exe.3dff630.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.Proforma Inv.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.2.Proforma Inv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.Proforma Inv.exe.3dff630.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0121C2840_2_0121C284
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0121E5210_2_0121E521
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0121E5690_2_0121E569
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0121E5780_2_0121E578
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC13C480_2_0CC13C48
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC166500_2_0CC16650
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC128580_2_0CC12858
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC1462A0_2_0CC1462A
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC168A00_2_0CC168A0
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC168B00_2_0CC168B0
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC100400_2_0CC10040
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC128480_2_0CC12848
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC100070_2_0CC10007
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC16AB30_2_0CC16AB3
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC16B580_2_0CC16B58
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC163100_2_0CC16310
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC16B210_2_0CC16B21
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00F9F0802_2_00F9F080
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00F961202_2_00F96120
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00F9F3C82_2_00F9F3C8
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613C2002_2_0613C200
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613EC082_2_0613EC08
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613D9382_2_0613D938
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061333302_2_06133330
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613CCD02_2_0613CCD0
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_063594512_2_06359451
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0635E5B92_2_0635E5B9
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06352DC02_2_06352DC0
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_063503D82_2_063503D8
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_063558682_2_06355868
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0635CAA82_2_0635CAA8
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_063503742_2_06350374
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06357BD82_2_06357BD8
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: String function: 06135E80 appears 35 times
                    Source: Proforma Inv.exeBinary or memory string: OriginalFilename vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxbFHqPWsbnQfPnkTjlnkheXJwv.exe4 vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.279897380.0000000007620000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.266264478.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBunifu.UI.dll4 vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.266264478.0000000002D01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxbFHqPWsbnQfPnkTjlnkheXJwv.exe4 vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.270800937.00000000031C0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.265427255.0000000000FEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000000.00000002.277363748.000000000419A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs Proforma Inv.exe
                    Source: Proforma Inv.exeBinary or memory string: OriginalFilename vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAxbFHqPWsbnQfPnkTjlnkheXJwv.exe4 vs Proforma Inv.exe
                    Source: Proforma Inv.exe, 00000002.00000002.508977073.0000000000AF8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Proforma Inv.exe
                    Source: Proforma Inv.exeBinary or memory string: OriginalFilenameHEhUz.exe8 vs Proforma Inv.exe
                    Source: Proforma Inv.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: Proforma Inv.exeVirustotal: Detection: 33%
                    Source: Proforma Inv.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\Proforma Inv.exe "C:\Users\user\Desktop\Proforma Inv.exe"
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess created: C:\Users\user\Desktop\Proforma Inv.exe {path}
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess created: C:\Users\user\Desktop\Proforma Inv.exe {path}Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Proforma Inv.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                    Source: C:\Users\user\Desktop\Proforma Inv.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.12.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.10.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.Proforma Inv.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: Proforma Inv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Proforma Inv.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Data Obfuscation

                    barindex
                    Source: Proforma Inv.exe, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 0.0.Proforma Inv.exe.960000.0.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 0.2.Proforma Inv.exe.960000.0.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.2.Proforma Inv.exe.680000.1.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.9.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.13.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.7.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.5.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.11.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.1.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.0.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.2.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: 2.0.Proforma Inv.exe.680000.3.unpack, Form1.cs.Net Code: PrivateSetup System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_00966A95 push es; retf 0_2_00966A96
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_00966A5E push es; retf 0_2_00966A60
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_00966A4D push es; retf 0_2_00966A4E
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_00966A70 push es; retf 0_2_00966A72
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC174E9 push eax; ret 0_2_0CC174EC
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC15E39 pushfd ; iretd 0_2_0CC15E3A
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 0_2_0CC11AE0 push esi; ret 0_2_0CC11AE2
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00686A70 push es; retf 2_2_00686A72
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00686A4D push es; retf 2_2_00686A4E
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00686A5E push es; retf 2_2_00686A60
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_00686A95 push es; retf 2_2_00686A96
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613165E push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_06131662 push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613166A push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613169A push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613169E push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316B2 push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316B6 push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316BA push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316BE push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316A6 push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316AA push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316AE push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316D2 push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316D6 push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316DA push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316DE push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316C2 push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316C6 push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316CA push es; ret 2_2_061318C4
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_061316CE push es; ret 2_2_061318C4
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.86044321518
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 6872, type: MEMORYSTR
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Proforma Inv.exe TID: 6912Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exe TID: 6232Thread sleep time: -18446744073709540s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exe TID: 6212Thread sleep count: 4984 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exe TID: 6212Thread sleep count: 3588 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWindow / User API: threadDelayed 4984Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWindow / User API: threadDelayed 3588Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\Proforma Inv.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: Proforma Inv.exe, 00000000.00000002.269280530.0000000003037000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeCode function: 2_2_0613BAE0 LdrInitializeThunk,2_2_0613BAE0
                    Source: C:\Users\user\Desktop\Proforma Inv.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Proforma Inv.exeMemory written: C:\Users\user\Desktop\Proforma Inv.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeProcess created: C:\Users\user\Desktop\Proforma Inv.exe {path}Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Users\user\Desktop\Proforma Inv.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Users\user\Desktop\Proforma Inv.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.Proforma Inv.exe.3dff630.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.Proforma Inv.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Proforma Inv.exe.3dff630.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.262428568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.263201971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 6872, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 7096, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Proforma Inv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: Yara matchFile source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 7096, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.Proforma Inv.exe.3dff630.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.Proforma Inv.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.Proforma Inv.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Proforma Inv.exe.3dff630.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.262428568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.263201971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 6872, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: Proforma Inv.exe PID: 7096, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    Path Interception111
                    Process Injection
                    1
                    Masquerading
                    2
                    OS Credential Dumping
                    211
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    Exfiltration Over Bluetooth1
                    Non-Standard Port
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    1
                    Credentials in Registry
                    131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    Automated Exfiltration1
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model2
                    Data from Local System
                    Scheduled Transfer11
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Remote System Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common4
                    Obfuscated Files or Information
                    Cached Domain Credentials114
                    System Information Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Proforma Inv.exe33%VirustotalBrowse
                    Proforma Inv.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    2.0.Proforma Inv.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    2.0.Proforma Inv.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    2.0.Proforma Inv.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    2.0.Proforma Inv.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    2.0.Proforma Inv.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    2.2.Proforma Inv.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                    http://XudLs2COBNu.org1-5-21-3853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                    http://XudLs2COBNu.org0%Avira URL Cloudsafe
                    http://www.fonts.comoth0%Avira URL Cloudsafe
                    http://www.urwpp.deFv0%Avira URL Cloudsafe
                    http://www.tiro.com0%URL Reputationsafe
                    http://www.goodfont.co.kr0%URL Reputationsafe
                    http://www.sandoll.co.krights0%Avira URL Cloudsafe
                    http://www.sajatypeworks.com0%URL Reputationsafe
                    http://www.typography.netD0%URL Reputationsafe
                    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                    http://fontfabrik.com0%URL Reputationsafe
                    http://www.fonts.comic0%URL Reputationsafe
                    http://www.founder.com.cn/cny0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    http://www.founder.com.cn/cnudi0%Avira URL Cloudsafe
                    http://www.fontbureau.comab0%Avira URL Cloudsafe
                    http://www.fonts.comn0%URL Reputationsafe
                    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                    http://www.fontbureau.comalic#0%Avira URL Cloudsafe
                    http://www.sandoll.co.kr0%URL Reputationsafe
                    http://www.founder.com.cn/cn/e(0%Avira URL Cloudsafe
                    http://www.urwpp.deDPlease0%URL Reputationsafe
                    http://www.urwpp.de0%URL Reputationsafe
                    http://www.zhongyicts.com.cn0%URL Reputationsafe
                    http://www.sakkal.com0%URL Reputationsafe
                    http://www.sandoll.co.krnta~0%Avira URL Cloudsafe
                    http://www.sajatypeworks.comh0%Avira URL Cloudsafe
                    http://WaIJyp.com0%Avira URL Cloudsafe
                    http://www.fontbureau.com=0%Avira URL Cloudsafe
                    http://www.fontbureau.comF0%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://www.sajatypeworks.coms0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://www.founder.com.cn/cnu-ru0%Avira URL Cloudsafe
                    http://www.fontbureau.comion0%URL Reputationsafe
                    http://mail.safalaw.com.ph0%Avira URL Cloudsafe
                    http://www.fontbureau.comasvi0%Avira URL Cloudsafe
                    http://www.fontbureau.comL.TTF0%URL Reputationsafe
                    http://www.sandoll.co.kre0%URL Reputationsafe
                    http://www.fontbureau.coma0%URL Reputationsafe
                    http://www.fontbureau.comd0%URL Reputationsafe
                    http://en.w0%URL Reputationsafe
                    http://www.carterandcone.coml0%URL Reputationsafe
                    http://www.sajatypeworks.comKfC0%Avira URL Cloudsafe
                    http://www.tiro.comcom0%URL Reputationsafe
                    http://www.founder.com.cn/cn0%URL Reputationsafe
                    http://www.fontbureau.comcomF0%URL Reputationsafe
                    http://www.fontbureau.comt0%URL Reputationsafe
                    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                    http://www.fontbureau.comionFt0%Avira URL Cloudsafe
                    http://www.fontbureau.comals0%URL Reputationsafe
                    http://www.fontbureau.comitua0%Avira URL Cloudsafe
                    http://www.fonts.comCH0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.safalaw.com.ph
                    207.148.117.199
                    truetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1Proforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.fontbureau.com/designersGProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bTheProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers?Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://XudLs2COBNu.org1-5-21-3853321935-2125563209-4053062332-1002_ClassesProforma Inv.exe, 00000002.00000003.279561854.0000000000C84000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            low
                            http://XudLs2COBNu.orgProforma Inv.exe, 00000002.00000002.510827489.0000000002E33000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fonts.comothProforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.urwpp.deFvProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.tiro.comProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designersProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sandoll.co.krightsProforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.sajatypeworks.comProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netDProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cn/cTheProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/staff/dennis.htmProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://fontfabrik.comProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fonts.comicProforma Inv.exe, 00000000.00000003.242919450.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnyProforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://DynDns.comDynDNSnamejidpasswordPsi/PsiProforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.founder.com.cn/cnudiProforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.comabProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fonts.comnProforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comalic#Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fonts.comProforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sandoll.co.krProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cn/e(Proforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.urwpp.deDPleaseProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sandoll.co.krnta~Proforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.sajatypeworks.comhProforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://WaIJyp.comProforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://www.fontbureau.com=Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://www.apache.org/licenses/LICENSE-2.0Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.fontbureau.comProforma Inv.exe, 00000000.00000002.278940493.0000000005D90000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.comFProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://sectigo.com/CPS0Proforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comsProforma Inv.exe, 00000000.00000003.242880391.0000000005DB4000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwProforma Inv.exe, 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnu-ruProforma Inv.exe, 00000000.00000003.244517298.0000000005DCD000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comionProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://mail.safalaw.com.phProforma Inv.exe, 00000002.00000002.510735000.0000000002E0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comasviProforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.248778008.0000000005D98000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.fontbureau.comL.TTFProforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sandoll.co.kreProforma Inv.exe, 00000000.00000003.243905944.0000000005D96000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comaProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.248778008.0000000005D98000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.comdProforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://en.wProforma Inv.exe, 00000000.00000003.242880391.0000000005DB4000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242392348.000000000145D000.00000004.00000020.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.carterandcone.comlProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comKfCProforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242766852.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242698082.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242656361.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242798809.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242919450.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242819494.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242891447.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242737289.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.tiro.comcomProforma Inv.exe, 00000000.00000003.243218227.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.243198712.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cnProforma Inv.exe, 00000000.00000003.244788585.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.246769169.0000000005D9D000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244537632.0000000005D94000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.244899824.0000000005D9B000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-jones.htmlProforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fontbureau.com/designers/cabarga.htmlProforma Inv.exe, 00000000.00000003.249428709.0000000005DC5000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249449455.0000000005DC5000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.comcomFProforma Inv.exe, 00000000.00000003.249393177.0000000005D9A000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.249167454.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.comtProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.jiyu-kobo.co.jp/Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.fontbureau.com/designers8Proforma Inv.exe, 00000000.00000002.279381567.0000000006FA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.comionFtProforma Inv.exe, 00000000.00000002.278940493.0000000005D90000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fontbureau.comalsProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://www.fontbureau.comituaProforma Inv.exe, 00000000.00000003.249877134.0000000005D99000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://www.fonts.comCHProforma Inv.exe, 00000000.00000003.242844157.0000000005DAB000.00000004.00000800.00020000.00000000.sdmp, Proforma Inv.exe, 00000000.00000003.242863799.0000000005DAB000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            207.148.117.199
                                            mail.safalaw.com.phUnited States
                                            20473AS-CHOOPAUStrue
                                            Joe Sandbox Version:34.0.0 Boulder Opal
                                            Analysis ID:605000
                                            Start date and time:2022-04-07 15:20:10 +02:00
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 9m 18s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Sample file name:Proforma Inv.exe
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:21
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HDC Information:Failed
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 90
                                            • Number of non-executed functions: 12
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                            • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net, arc.msn.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            TimeTypeDescription
                                            17:21:17API Interceptor790x Sleep call for process: Proforma Inv.exe modified
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            AS-CHOOPAUSMSA_Order_Invoice.xlsxGet hashmaliciousBrowse
                                            • 45.32.168.40
                                            Jl60SXP5lb.exeGet hashmaliciousBrowse
                                            • 149.28.253.196
                                            rfTuU7A7GgGet hashmaliciousBrowse
                                            • 204.80.129.50
                                            xiJJkWcUxrGet hashmaliciousBrowse
                                            • 155.138.149.197
                                            mipsel-20220406-2027Get hashmaliciousBrowse
                                            • 44.174.4.13
                                            30067 0404.xlsGet hashmaliciousBrowse
                                            • 66.42.57.149
                                            5f1hPXQgBa.exeGet hashmaliciousBrowse
                                            • 149.28.253.196
                                            RoundSliderCtrlDemo.dllGet hashmaliciousBrowse
                                            • 45.76.1.145
                                            68fi1wdDeP.xlsGet hashmaliciousBrowse
                                            • 209.250.246.206
                                            2000005469-QTE-22-2218.xlsxGet hashmaliciousBrowse
                                            • 104.207.154.221
                                            ACH Payment 03 28 22.xlsGet hashmaliciousBrowse
                                            • 209.250.246.206
                                            AKWUgIF0dSGet hashmaliciousBrowse
                                            • 68.232.173.156
                                            https://onedrive.live.com/download?cid=87DD23D1FBE63328&resid=87DD23D1FBE63328%21112&authkey=AP_pAPnoozjVB1IGet hashmaliciousBrowse
                                            • 66.55.148.229
                                            5AQe5mOS1Q.xlsGet hashmaliciousBrowse
                                            • 66.42.57.149
                                            5TT_04042022.xlsGet hashmaliciousBrowse
                                            • 66.42.57.149
                                            emotet.dllGet hashmaliciousBrowse
                                            • 66.42.57.149
                                            IaulfEncASGet hashmaliciousBrowse
                                            • 45.63.53.210
                                            6YmzmvBuGwGet hashmaliciousBrowse
                                            • 45.63.53.233
                                            yGo4w7qIVaGet hashmaliciousBrowse
                                            • 45.32.45.173
                                            RI3VRtb7MKGet hashmaliciousBrowse
                                            • 45.32.45.194
                                            No context
                                            No context
                                            Process:C:\Users\user\Desktop\Proforma Inv.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1216
                                            Entropy (8bit):5.355304211458859
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
                                            MD5:69206D3AF7D6EFD08F4B4726998856D3
                                            SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
                                            SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
                                            SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):7.85181290405052
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            • DOS Executable Generic (2002/1) 0.01%
                                            File name:Proforma Inv.exe
                                            File size:444928
                                            MD5:189ad2733ba3c8baa0d9fb41e4223d92
                                            SHA1:90d2762579dfd97d7b767662566f3a623766dd0a
                                            SHA256:d73763f8b8d4eb91dec386eb7a2ebf9a8a9b40c6b028d57e6144ed74551d460b
                                            SHA512:a255eb116180e54ca4966b6596adccffb56deac442f64ed570814f2205811b3e5d2263ce4f0f2183851530b962f754fe3fe3561dda93dd3e20f6ac46dc6f0901
                                            SSDEEP:12288:wJrxvRItNiL65tIekTAEr4xwWEL9KHHvxosMKnd:8fsiL65t7kT1rjhKHH5os
                                            TLSH:2694DFA05A162183D2906F72C0E3CCB03AE5B1DA9259F7DEBC84DB543FE5198C644BBD
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Nb..............P.............v.... ........@.. ....................... ............@................................
                                            Icon Hash:00828e8e8686b000
                                            Entrypoint:0x46de76
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                            Time Stamp:0x624ECABA [Thu Apr 7 11:27:54 2022 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:v4.0.30319
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x6de240x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e0000x5b4.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x700000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000x6be7c0x6c000False0.901538990162data7.86044321518IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                            .rsrc0x6e0000x5b40x600False0.427734375data4.12184998186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0x700000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountry
                                            RT_VERSION0x6e0900x324data
                                            RT_MANIFEST0x6e3c40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            DescriptionData
                                            Translation0x0000 0x04b0
                                            LegalCopyrightCopyright 2016
                                            Assembly Version1.0.0.0
                                            InternalNameHEhUz.exe
                                            FileVersion1.0.0.0
                                            CompanyNameMicrosoft
                                            LegalTrademarks
                                            Comments
                                            ProductNameDaily Notes
                                            ProductVersion1.0.0.0
                                            FileDescriptionDaily Notes
                                            OriginalFilenameHEhUz.exe
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 7, 2022 17:21:35.132299900 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:35.378325939 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:35.378420115 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:35.700582981 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:35.700885057 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:35.946814060 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:35.952491999 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:36.198868990 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.275157928 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:36.525212049 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.525239944 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.525254965 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.525265932 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.525348902 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:36.525912046 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.570353985 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:36.816478014 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:36.903961897 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:37.083776951 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:37.329756975 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:37.330904961 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:37.577114105 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:37.577652931 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:37.831244946 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:37.832106113 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.077944040 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.078320026 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.325915098 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.326359034 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.572231054 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.573324919 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.573427916 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.574114084 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.574244022 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:21:38.819161892 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.819189072 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.819694042 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:38.819741011 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:39.898117065 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:21:40.113773108 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:23:14.007035017 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:23:14.293694973 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:23:14.816061020 CEST58749756207.148.117.199192.168.2.3
                                            Apr 7, 2022 17:23:14.881441116 CEST49756587192.168.2.3207.148.117.199
                                            Apr 7, 2022 17:23:14.908955097 CEST49756587192.168.2.3207.148.117.199
                                            TimestampSource PortDest PortSource IPDest IP
                                            Apr 7, 2022 17:21:34.419188976 CEST4932753192.168.2.38.8.8.8
                                            Apr 7, 2022 17:21:35.039096117 CEST53493278.8.8.8192.168.2.3
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Apr 7, 2022 17:21:34.419188976 CEST192.168.2.38.8.8.80xbb23Standard query (0)mail.safalaw.com.phA (IP address)IN (0x0001)
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Apr 7, 2022 17:21:35.039096117 CEST8.8.8.8192.168.2.30xbb23No error (0)mail.safalaw.com.ph207.148.117.199A (IP address)IN (0x0001)
                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Apr 7, 2022 17:21:35.700582981 CEST58749756207.148.117.199192.168.2.3220-s482.sgp9.mysecurecloudhost.com ESMTP Exim 4.95 #2 Thu, 07 Apr 2022 15:21:35 +0000
                                            220-We do not authorize the use of this system to transport unsolicited,
                                            220 and/or bulk e-mail.
                                            Apr 7, 2022 17:21:35.700885057 CEST49756587192.168.2.3207.148.117.199EHLO 688098
                                            Apr 7, 2022 17:21:35.946814060 CEST58749756207.148.117.199192.168.2.3250-s482.sgp9.mysecurecloudhost.com Hello 688098 [84.17.52.18]
                                            250-SIZE 52428800
                                            250-8BITMIME
                                            250-PIPELINING
                                            250-PIPE_CONNECT
                                            250-STARTTLS
                                            250 HELP
                                            Apr 7, 2022 17:21:35.952491999 CEST49756587192.168.2.3207.148.117.199STARTTLS
                                            Apr 7, 2022 17:21:36.198868990 CEST58749756207.148.117.199192.168.2.3220 TLS go ahead

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:17:21:09
                                            Start date:07/04/2022
                                            Path:C:\Users\user\Desktop\Proforma Inv.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Proforma Inv.exe"
                                            Imagebase:0x960000
                                            File size:444928 bytes
                                            MD5 hash:189AD2733BA3C8BAA0D9FB41E4223D92
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.272478585.0000000003D09000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low

                                            Target ID:2
                                            Start time:17:21:19
                                            Start date:07/04/2022
                                            Path:C:\Users\user\Desktop\Proforma Inv.exe
                                            Wow64 process (32bit):true
                                            Commandline:{path}
                                            Imagebase:0x680000
                                            File size:444928 bytes
                                            MD5 hash:189AD2733BA3C8BAA0D9FB41E4223D92
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.508474036.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.262797800.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.263643345.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.262428568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.262428568.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.263201971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.263201971.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.510096392.0000000002AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:11.1%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:3.8%
                                              Total number of Nodes:208
                                              Total number of Limit Nodes:12
                                              execution_graph 17370 12164a0 17371 12164b0 17370->17371 17374 12151ec 17371->17374 17373 12164bd 17375 12151f7 17374->17375 17378 12164d0 17375->17378 17377 1216965 17377->17373 17379 12164db 17378->17379 17382 1216500 17379->17382 17381 1216a42 17381->17377 17383 121650b 17382->17383 17386 1216530 17383->17386 17385 1216b42 17385->17381 17387 121653b 17386->17387 17389 121725e 17387->17389 17392 12193a0 17387->17392 17388 121729c 17388->17385 17389->17388 17396 121b4f8 17389->17396 17401 12193c7 17392->17401 17406 12193d8 17392->17406 17393 12193b6 17393->17389 17397 121b529 17396->17397 17398 121b54d 17397->17398 17438 121b6a7 17397->17438 17442 121b6b8 17397->17442 17398->17388 17402 12193d8 17401->17402 17410 12194c0 17402->17410 17418 12194d0 17402->17418 17403 12193e7 17403->17393 17408 12194c0 2 API calls 17406->17408 17409 12194d0 2 API calls 17406->17409 17407 12193e7 17407->17393 17408->17407 17409->17407 17411 12194e3 17410->17411 17412 12194fb 17411->17412 17426 1219748 17411->17426 17430 1219758 17411->17430 17412->17403 17413 12194f3 17413->17412 17414 12196f8 GetModuleHandleW 17413->17414 17415 1219725 17414->17415 17415->17403 17419 12194e3 17418->17419 17420 12194fb 17419->17420 17424 1219748 LoadLibraryExW 17419->17424 17425 1219758 LoadLibraryExW 17419->17425 17420->17403 17421 12194f3 17421->17420 17422 12196f8 GetModuleHandleW 17421->17422 17423 1219725 17422->17423 17423->17403 17424->17421 17425->17421 17427 1219752 17426->17427 17429 1219791 17427->17429 17434 1218a78 17427->17434 17429->17413 17431 121976c 17430->17431 17432 1218a78 LoadLibraryExW 17431->17432 17433 1219791 17431->17433 17432->17433 17433->17413 17435 1219938 LoadLibraryExW 17434->17435 17437 12199b1 17435->17437 17437->17429 17439 121b6c5 17438->17439 17440 121b6ff 17439->17440 17446 121a19c 17439->17446 17440->17398 17443 121b6c5 17442->17443 17444 121b6ff 17443->17444 17445 121a19c 3 API calls 17443->17445 17444->17398 17445->17444 17447 121a1a7 17446->17447 17449 121c3f8 17447->17449 17450 121bfb8 17447->17450 17451 121bfc3 17450->17451 17452 1216530 3 API calls 17451->17452 17453 121c467 17452->17453 17454 121c4a0 17453->17454 17457 121e1d0 17453->17457 17463 121e1e8 17453->17463 17454->17449 17459 121e219 17457->17459 17460 121e266 17457->17460 17458 121e225 17458->17454 17459->17458 17469 121e521 17459->17469 17474 121e530 17459->17474 17460->17454 17465 121e266 17463->17465 17466 121e219 17463->17466 17464 121e225 17464->17454 17465->17454 17466->17464 17467 121e521 2 API calls 17466->17467 17468 121e530 2 API calls 17466->17468 17467->17465 17468->17465 17470 121e52a 17469->17470 17473 121e57d 17469->17473 17471 12194d0 LoadLibraryExW GetModuleHandleW 17470->17471 17472 121e539 17471->17472 17472->17460 17473->17460 17475 12194d0 LoadLibraryExW GetModuleHandleW 17474->17475 17476 121e539 17474->17476 17475->17476 17476->17460 17627 cc11763 17628 cc11766 17627->17628 17629 cc1172c 17627->17629 17629->17627 17630 cc11727 17629->17630 17634 cc12750 VirtualProtect 17629->17634 17635 cc12749 VirtualProtect 17629->17635 17632 cc12750 VirtualProtect 17630->17632 17633 cc12749 VirtualProtect 17630->17633 17631 cc11735 17632->17631 17633->17631 17634->17629 17635->17629 17477 cc18708 17478 cc18893 17477->17478 17479 cc1872e 17477->17479 17479->17478 17484 121ff40 SetWindowLongW 17479->17484 17486 121ff38 SetWindowLongW 17479->17486 17488 cc18980 17479->17488 17491 cc18988 PostMessageW 17479->17491 17485 121ffac 17484->17485 17485->17479 17487 121ffac 17486->17487 17487->17479 17489 cc18988 PostMessageW 17488->17489 17490 cc189f4 17489->17490 17490->17479 17492 cc189f4 17491->17492 17492->17479 17493 cc114cd 17497 cc12750 17493->17497 17500 cc12749 17493->17500 17494 cc114e9 17498 cc12798 VirtualProtect 17497->17498 17499 cc127d2 17498->17499 17499->17494 17501 cc12750 VirtualProtect 17500->17501 17503 cc127d2 17501->17503 17503->17494 17504 cc15e8d 17508 cc162c0 17504->17508 17512 cc162b0 17504->17512 17505 cc15e99 17509 cc162dd 17508->17509 17516 cc16650 17509->17516 17513 cc162dd 17512->17513 17515 cc16650 13 API calls 17513->17515 17514 cc16300 17514->17505 17515->17514 17517 cc1665d 17516->17517 17518 cc16300 17517->17518 17527 cc17459 17517->17527 17531 cc179f7 17517->17531 17535 cc16e1e 17517->17535 17539 cc171ae 17517->17539 17543 cc1738a 17517->17543 17548 cc16ebb 17517->17548 17552 cc16f0b 17517->17552 17556 cc17a79 17517->17556 17518->17505 17561 cc17f08 17527->17561 17565 cc17efc 17527->17565 17569 cc184b0 17531->17569 17573 cc184aa 17531->17573 17532 cc17a0f 17577 cc18330 17535->17577 17581 cc18338 17535->17581 17536 cc16e36 17541 cc184b0 WriteProcessMemory 17539->17541 17542 cc184aa WriteProcessMemory 17539->17542 17540 cc171d2 17541->17540 17542->17540 17585 cc18270 17543->17585 17589 cc18278 17543->17589 17593 cc18222 17543->17593 17544 cc17398 17550 cc184b0 WriteProcessMemory 17548->17550 17551 cc184aa WriteProcessMemory 17548->17551 17549 cc16ed5 17550->17549 17551->17549 17598 cc18400 17552->17598 17602 cc18408 17552->17602 17553 cc16f20 17557 cc17a7f 17556->17557 17605 cc18661 17557->17605 17609 cc18668 17557->17609 17558 cc17a9b 17562 cc17f87 CreateProcessW 17561->17562 17564 cc18070 17562->17564 17566 cc17f87 CreateProcessW 17565->17566 17568 cc18070 17566->17568 17570 cc184fb WriteProcessMemory 17569->17570 17572 cc1854c 17570->17572 17572->17532 17574 cc184b0 WriteProcessMemory 17573->17574 17576 cc1854c 17574->17576 17576->17532 17578 cc18333 17577->17578 17579 cc18392 ReadProcessMemory 17577->17579 17578->17579 17580 cc183c6 17579->17580 17580->17536 17582 cc18383 ReadProcessMemory 17581->17582 17584 cc183c6 17582->17584 17584->17536 17586 cc182c0 SetThreadContext 17585->17586 17588 cc182fe 17586->17588 17588->17544 17590 cc182c0 SetThreadContext 17589->17590 17592 cc182fe 17590->17592 17592->17544 17595 cc1828a SetThreadContext 17593->17595 17596 cc1822b 17593->17596 17597 cc182fe 17595->17597 17596->17544 17597->17544 17599 cc18408 VirtualAllocEx 17598->17599 17601 cc18482 17599->17601 17601->17553 17603 cc1844b VirtualAllocEx 17602->17603 17604 cc18482 17603->17604 17604->17553 17606 cc18668 ResumeThread 17605->17606 17608 cc186d6 17606->17608 17608->17558 17610 cc186a9 ResumeThread 17609->17610 17611 cc186d6 17610->17611 17611->17558 17640 cc11e71 17642 cc12750 VirtualProtect 17640->17642 17643 cc12749 VirtualProtect 17640->17643 17641 cc11e82 17642->17641 17643->17641 17644 121b7d0 GetCurrentProcess 17645 121b843 17644->17645 17646 121b84a GetCurrentThread 17644->17646 17645->17646 17647 121b880 17646->17647 17648 121b887 GetCurrentProcess 17646->17648 17647->17648 17649 121b8bd 17648->17649 17650 121b8e5 GetCurrentThreadId 17649->17650 17651 121b916 17650->17651 17612 cc11995 17613 cc1199a 17612->17613 17615 cc12750 VirtualProtect 17613->17615 17616 cc12749 VirtualProtect 17613->17616 17614 cc119ab 17615->17614 17616->17614 17621 121fcf8 17622 121fd60 CreateWindowExW 17621->17622 17624 121fe1c 17622->17624 17625 121b9f8 DuplicateHandle 17626 121ba8e 17625->17626

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 39 cc16650-cc16685 41 cc16687 39->41 42 cc1668c-cc166b3 39->42 41->42 43 cc166b4 42->43 44 cc166bb-cc166d7 43->44 45 cc166e0-cc166e1 44->45 46 cc166d9 44->46 53 cc16833-cc16854 45->53 46->43 46->45 47 cc167c1-cc167d3 46->47 48 cc16740-cc16744 46->48 49 cc16726-cc1673b 46->49 50 cc166e6-cc166e7 46->50 51 cc167a9-cc167bc 46->51 52 cc166ec-cc166f5 46->52 46->53 54 cc16777-cc16796 46->54 55 cc166f7-cc166ff 46->55 56 cc167f6-cc16807 46->56 57 cc167d8-cc167f1 46->57 58 cc1679b-cc167a4 46->58 47->44 63 cc16757-cc1675e 48->63 64 cc16746-cc16755 48->64 49->44 61 cc16856-cc1685f 50->61 51->44 52->44 53->61 54->44 68 cc16702 call cc179f7 55->68 69 cc16702 call cc17459 55->69 70 cc16702 call cc17a79 55->70 71 cc16702 call cc177c8 55->71 72 cc16702 call cc16f0b 55->72 73 cc16702 call cc16ebb 55->73 74 cc16702 call cc1738a 55->74 75 cc16702 call cc171ae 55->75 76 cc16702 call cc16e1e 55->76 59 cc16809-cc16818 56->59 60 cc1681a-cc16821 56->60 57->44 58->44 66 cc16828-cc1682e 59->66 60->66 65 cc16765-cc16772 63->65 64->65 65->44 66->44 67 cc16708-cc16724 67->44 68->67 69->67 70->67 71->67 72->67 73->67 74->67 75->67 76->67
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ="J$="J
                                              • API String ID: 0-3456505134
                                              • Opcode ID: e62db493a890cc3a140d19c89cf9da0aeb8773728f74ec9e0d8da9dded949ab7
                                              • Instruction ID: 08904fbfc779da0435cbeecf61818a22bc3c65005baad83d9e9fc0e107f51888
                                              • Opcode Fuzzy Hash: e62db493a890cc3a140d19c89cf9da0aeb8773728f74ec9e0d8da9dded949ab7
                                              • Instruction Fuzzy Hash: A5514DB0E06218EBDB14CFA6E6806EDFBB2EB49310F20A42AE815B7254D7348941DF54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: V1H,
                                              • API String ID: 0-3774064939
                                              • Opcode ID: 8066d22e2fec17e4edbdf1fe326552c38762d21ff39140f2828f9f1f9b23d66a
                                              • Instruction ID: 7acec6a6c5fe877ff7d2ae9e4bb428ac4b2c80717b531060315c6e9af2b1e81d
                                              • Opcode Fuzzy Hash: 8066d22e2fec17e4edbdf1fe326552c38762d21ff39140f2828f9f1f9b23d66a
                                              • Instruction Fuzzy Hash: 89D14575E14248DFCB54DFAAE588A4DBBF1FB8A710F119069D806AB224DB34AA41CF50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: V1H,
                                              • API String ID: 0-3774064939
                                              • Opcode ID: dd7e2e654e5b093267fdbc54dff9b9ecdc137c41a412cbd93cac0ebfdf24691b
                                              • Instruction ID: 1ec4a8b44ff824b0d13b99c77aa51ae69e618c8b4f04f8d446d87da8a9c9ec16
                                              • Opcode Fuzzy Hash: dd7e2e654e5b093267fdbc54dff9b9ecdc137c41a412cbd93cac0ebfdf24691b
                                              • Instruction Fuzzy Hash: 3DD15674E14208CFCB54DFAAE588A4DBBF1FB8A710F119069D806EB224DB34AD41CF50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a0f50b8d133a9933821c873fa21b48a0f09b23ad5c0a320f2b3eddb242d1f81e
                                              • Instruction ID: 3231d379d40766d3970ae8d663dbc2258d6dedd71b4f7ccfcf410c47181e0e95
                                              • Opcode Fuzzy Hash: a0f50b8d133a9933821c873fa21b48a0f09b23ad5c0a320f2b3eddb242d1f81e
                                              • Instruction Fuzzy Hash: 1CB17B74E052498FCB44CFAAC5415DEFBF2BF8A304F28C16AD805AB368D7349902CB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3a88e74f1c4de4390a0fb465833779580d7ac54b0230066472c48b01dc72d718
                                              • Instruction ID: 030efc7ca36dae961058a7fa934fc5f12568a43115e9f3ecfa7fa9f619a5b785
                                              • Opcode Fuzzy Hash: 3a88e74f1c4de4390a0fb465833779580d7ac54b0230066472c48b01dc72d718
                                              • Instruction Fuzzy Hash: 67C14CB18117468BD7A8DF65E9881893BB3FB85328F51422CD2716B6D8D7B410EECF84
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c83bb91d7b117e36dc31f181e2fd6adfcd8f188639ecf4aa4ee5a43133612319
                                              • Instruction ID: 2864d41fd8c4d511d2267d850509a11b10956728ef713b256a82aa1271f0d44a
                                              • Opcode Fuzzy Hash: c83bb91d7b117e36dc31f181e2fd6adfcd8f188639ecf4aa4ee5a43133612319
                                              • Instruction Fuzzy Hash: D7113C70D05258CBDB14DFA6D418BEEBBF1BB4E311F24906AD801B3290CB748A84DF69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0121B830
                                              • GetCurrentThread.KERNEL32 ref: 0121B86D
                                              • GetCurrentProcess.KERNEL32 ref: 0121B8AA
                                              • GetCurrentThreadId.KERNEL32 ref: 0121B903
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: f88e38eba244eb10fbeb838642c6fabac6f631786bae71750fefa4497b5e0e18
                                              • Instruction ID: 5b1cfd3a3a3b0ec3a4474ce75ac974a23cc19edaaac9c52538e1ebea11ede828
                                              • Opcode Fuzzy Hash: f88e38eba244eb10fbeb838642c6fabac6f631786bae71750fefa4497b5e0e18
                                              • Instruction Fuzzy Hash: D15165B09003898FEB14CFA9D648BAEBBF0AF88314F208459E549A73A4D7749844CF65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 0121B830
                                              • GetCurrentThread.KERNEL32 ref: 0121B86D
                                              • GetCurrentProcess.KERNEL32 ref: 0121B8AA
                                              • GetCurrentThreadId.KERNEL32 ref: 0121B903
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 35c15040890f7557091918e01e6a235d545a4f4219386f3fd7f5a54a8161a2b0
                                              • Instruction ID: e4e078c15e277a73544409747c2fd489a3324151a2cebdc4d465eabcc33d08d0
                                              • Opcode Fuzzy Hash: 35c15040890f7557091918e01e6a235d545a4f4219386f3fd7f5a54a8161a2b0
                                              • Instruction Fuzzy Hash: 805153B49002498FEB14CFA9C648BEEBBF0AF88314F208459E559B73A4D7749844CF65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 77 12194d0-12194d8 78 12194e3-12194e5 77->78 79 12194de call 1218a10 77->79 80 12194e7 78->80 81 12194fb-12194ff 78->81 79->78 132 12194ed call 1219748 80->132 133 12194ed call 1219758 80->133 82 1219501-121950b 81->82 83 1219513-1219554 81->83 82->83 88 1219561-121956f 83->88 89 1219556-121955e 83->89 84 12194f3-12194f5 84->81 86 1219630-12196f0 84->86 125 12196f2-12196f5 86->125 126 12196f8-1219723 GetModuleHandleW 86->126 90 1219571-1219576 88->90 91 1219593-1219595 88->91 89->88 93 1219581 90->93 94 1219578-121957f call 1218a1c 90->94 95 1219598-121959f 91->95 100 1219583-1219591 93->100 94->100 98 12195a1-12195a9 95->98 99 12195ac-12195b3 95->99 98->99 102 12195c0-12195c9 call 1218a2c 99->102 103 12195b5-12195bd 99->103 100->95 107 12195d6-12195db 102->107 108 12195cb-12195d3 102->108 103->102 110 12195f9-12195fd 107->110 111 12195dd-12195e4 107->111 108->107 130 1219600 call 1219a30 110->130 131 1219600 call 1219a60 110->131 111->110 112 12195e6-12195f6 call 1218a3c call 1218a4c 111->112 112->110 115 1219603-1219606 117 1219629-121962f 115->117 118 1219608-1219626 115->118 118->117 125->126 127 1219725-121972b 126->127 128 121972c-1219740 126->128 127->128 130->115 131->115 132->84 133->84
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 01219716
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 21c405b2fbbdcc1b78f2fb12d54237a0bac61ee645469a28e87f46a0dbf03adf
                                              • Instruction ID: 26dbc88dd6215f35bcde59edfc1404187ba7d381053033568088abf55e815a82
                                              • Opcode Fuzzy Hash: 21c405b2fbbdcc1b78f2fb12d54237a0bac61ee645469a28e87f46a0dbf03adf
                                              • Instruction Fuzzy Hash: A5714670A10B058FDB24DF6AD0557AABBF1FF88208F00892DD58AE7A54DB74E8458F91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 134 cc17efc-cc17f93 136 cc17f95-cc17f9b 134->136 137 cc17f9e-cc17fa5 134->137 136->137 138 cc17fb0-cc17fc6 137->138 139 cc17fa7-cc17fad 137->139 140 cc17fd1-cc1806e CreateProcessW 138->140 141 cc17fc8-cc17fce 138->141 139->138 143 cc18070-cc18076 140->143 144 cc18077-cc180eb 140->144 141->140 143->144 152 cc180fd-cc18104 144->152 153 cc180ed-cc180f3 144->153 154 cc18106-cc18115 152->154 155 cc1811b 152->155 153->152 154->155 157 cc1811c 155->157 157->157
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 0CC1805B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: 656b4752a5281a2a2c8b0832e27372ec41f91889eacaa8cbd15222c9576ac1b2
                                              • Instruction ID: e2e60570c92cbb507265f2f7bea787f58d1f4974149cca6b1f4a2131cd7288cc
                                              • Opcode Fuzzy Hash: 656b4752a5281a2a2c8b0832e27372ec41f91889eacaa8cbd15222c9576ac1b2
                                              • Instruction Fuzzy Hash: BB51F271900218DFDB24CF99C980BDEBBB1BF49314F15859AE908A7250DB749A89CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 158 cc17f08-cc17f93 160 cc17f95-cc17f9b 158->160 161 cc17f9e-cc17fa5 158->161 160->161 162 cc17fb0-cc17fc6 161->162 163 cc17fa7-cc17fad 161->163 164 cc17fd1-cc1806e CreateProcessW 162->164 165 cc17fc8-cc17fce 162->165 163->162 167 cc18070-cc18076 164->167 168 cc18077-cc180eb 164->168 165->164 167->168 176 cc180fd-cc18104 168->176 177 cc180ed-cc180f3 168->177 178 cc18106-cc18115 176->178 179 cc1811b 176->179 177->176 178->179 181 cc1811c 179->181 181->181
                                              APIs
                                              • CreateProcessW.KERNELBASE(?,?,00000009,?,?,?,?,?,?,?), ref: 0CC1805B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: CreateProcess
                                              • String ID:
                                              • API String ID: 963392458-0
                                              • Opcode ID: be4b5a698694ee99d5b8d1ad79aaf8fc95d8b57ad4df1c7ec43a61d9ae7df381
                                              • Instruction ID: 27adba890922af6ab2ba22d6738a2d18a154fe4d5ae55109bcd58e57ffdd4694
                                              • Opcode Fuzzy Hash: be4b5a698694ee99d5b8d1ad79aaf8fc95d8b57ad4df1c7ec43a61d9ae7df381
                                              • Instruction Fuzzy Hash: 8B51F3719002189FDB20CF96C880BDEBBB1BF49314F15859AE908A7250DB719A89CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 182 121fcec-121fd5e 184 121fd60-121fd66 182->184 185 121fd69-121fd70 182->185 184->185 186 121fd72-121fd78 185->186 187 121fd7b-121fdb3 185->187 186->187 188 121fdbb-121fe1a CreateWindowExW 187->188 189 121fe23-121fe5b 188->189 190 121fe1c-121fe22 188->190 194 121fe68 189->194 195 121fe5d-121fe60 189->195 190->189 196 121fe69 194->196 195->194 196->196
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0121FE0A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: d6677b6e5fbd8ebe28d23396c368dcdb0d00c780268e6c79caed3853402bb30b
                                              • Instruction ID: 9a5e89c4f52894936ac54cfd59795954ae789e56ba146bb7c66f21d6157bc621
                                              • Opcode Fuzzy Hash: d6677b6e5fbd8ebe28d23396c368dcdb0d00c780268e6c79caed3853402bb30b
                                              • Instruction Fuzzy Hash: 9151EFB1D103099FDF14CFA9C984ADEBFB1BF48310F24822AE819AB254D7749885CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 197 121fcf8-121fd5e 198 121fd60-121fd66 197->198 199 121fd69-121fd70 197->199 198->199 200 121fd72-121fd78 199->200 201 121fd7b-121fe1a CreateWindowExW 199->201 200->201 203 121fe23-121fe5b 201->203 204 121fe1c-121fe22 201->204 208 121fe68 203->208 209 121fe5d-121fe60 203->209 204->203 210 121fe69 208->210 209->208 210->210
                                              APIs
                                              • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0121FE0A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: CreateWindow
                                              • String ID:
                                              • API String ID: 716092398-0
                                              • Opcode ID: 7803451242cccd2028c540c981d14b7f015ea320ef75f4ef1f15a1a3c47849ad
                                              • Instruction ID: 41eb58178c079b3348a9729062e7c5066c3b301f5d3406b7e411e90c76299cc6
                                              • Opcode Fuzzy Hash: 7803451242cccd2028c540c981d14b7f015ea320ef75f4ef1f15a1a3c47849ad
                                              • Instruction Fuzzy Hash: 7741D1B1D103499FDF14CF99C980ADEBBF5BF48314F24812AE419AB214D7709845CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 211 cc18222-cc18229 212 cc1822b-cc1824b 211->212 213 cc1828a-cc182c4 211->213 218 cc18252-cc18266 212->218 219 cc1824d 212->219 216 cc182d0-cc182fc SetThreadContext 213->216 217 cc182c6-cc182ce 213->217 220 cc18305-cc18326 216->220 221 cc182fe-cc18304 216->221 217->216 219->218 221->220
                                              APIs
                                              • SetThreadContext.KERNELBASE(?,00000000), ref: 0CC182EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: ContextThread
                                              • String ID:
                                              • API String ID: 1591575202-0
                                              • Opcode ID: c88095174381c34f9759f7b224019b700cb36a522569efeb77014b34268f3096
                                              • Instruction ID: 9da929a860bc8824d5cb424d3f20ac70fdfd914e982cc7378cc9f2c2127c2c5e
                                              • Opcode Fuzzy Hash: c88095174381c34f9759f7b224019b700cb36a522569efeb77014b34268f3096
                                              • Instruction Fuzzy Hash: 432147B1E042099FCB00CF99C5457EEBBF4FB49214F15816AD818A3780D778A940CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 224 cc184aa-cc18501 227 cc18511-cc1854a WriteProcessMemory 224->227 228 cc18503-cc1850f 224->228 229 cc18553-cc18574 227->229 230 cc1854c-cc18552 227->230 228->227 230->229
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0CC1853D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 707ef2f94baddf8d0fdf5d356c4a9efc3def1667257ea533a317ac77e6aa9020
                                              • Instruction ID: 5f13882e15c1537532b1cbbd1beb712291622211a828a249caed809bd15d9b1b
                                              • Opcode Fuzzy Hash: 707ef2f94baddf8d0fdf5d356c4a9efc3def1667257ea533a317ac77e6aa9020
                                              • Instruction Fuzzy Hash: E62116B1A002499FDB10CF9AC885BDEBBF4FF49314F10842AE918A3340D774A944DBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 232 cc184b0-cc18501 234 cc18511-cc1854a WriteProcessMemory 232->234 235 cc18503-cc1850f 232->235 236 cc18553-cc18574 234->236 237 cc1854c-cc18552 234->237 235->234 237->236
                                              APIs
                                              • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0CC1853D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: MemoryProcessWrite
                                              • String ID:
                                              • API String ID: 3559483778-0
                                              • Opcode ID: 4920f4213577f3a698cb0d974f7d26e886c9c658d697daef89c23ef454cab21b
                                              • Instruction ID: c4eb1681f4fbab1f8a49c26a1c226c0936446754fb95a84a03479f1bc5031c08
                                              • Opcode Fuzzy Hash: 4920f4213577f3a698cb0d974f7d26e886c9c658d697daef89c23ef454cab21b
                                              • Instruction Fuzzy Hash: 7221E4B1A002499FDB10CF9AD885BDEBBF4FB49314F50842AE918A3350D774AA44DBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 239 121b9f1 240 121b9f8-121ba8c DuplicateHandle 239->240 241 121ba95-121bab2 240->241 242 121ba8e-121ba94 240->242 242->241
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0121BA7F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: c5fe2ecf4f171a2880b970e53c93a6da2fa51e5dee74fef051376784c8048f87
                                              • Instruction ID: 4ce6a88b9cee4c596263357c893304370e7667aeb4dcd0b324cf16f7b9d3033f
                                              • Opcode Fuzzy Hash: c5fe2ecf4f171a2880b970e53c93a6da2fa51e5dee74fef051376784c8048f87
                                              • Instruction Fuzzy Hash: EC21E4B5D00249AFDF10CFAAD984AEEBFF4EB48320F14841AE954A3350D374A944DFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 245 121b9f8-121ba8c DuplicateHandle 246 121ba95-121bab2 245->246 247 121ba8e-121ba94 245->247 247->246
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0121BA7F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: 796b88d0dd158f582db90505b240121eb17db9484917ea9dba85c6fb28b074ec
                                              • Instruction ID: bddfb3b893859484c956faf556e71d67a76dfb6f9ed11d405baae9411e766882
                                              • Opcode Fuzzy Hash: 796b88d0dd158f582db90505b240121eb17db9484917ea9dba85c6fb28b074ec
                                              • Instruction Fuzzy Hash: 4E21E4B5D002499FDB10CFAAD884AEEBBF4EB48320F14841AE914A3310D374A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 250 cc18330-cc18331 251 cc18333-cc1838f 250->251 252 cc18392-cc183c4 ReadProcessMemory 250->252 251->252 254 cc183c6-cc183cc 252->254 255 cc183cd-cc183ee 252->255 254->255
                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0CC183B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: 387f5ccd73d9e744d64ca9f6c82c1671e7f8a649f5072c6ab19a71ad1d38711b
                                              • Instruction ID: 87a7953a556fc5eacaf55d93170933310307c66c99fb9d3964f764a145b2d2f6
                                              • Opcode Fuzzy Hash: 387f5ccd73d9e744d64ca9f6c82c1671e7f8a649f5072c6ab19a71ad1d38711b
                                              • Instruction Fuzzy Hash: 6121F3B6D002499FCB10CF9AD884BDEBBF4FB48320F54842AE918A7350D334A554DBA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 258 cc18270-cc182c4 260 cc182d0-cc182fc SetThreadContext 258->260 261 cc182c6-cc182ce 258->261 262 cc18305-cc18326 260->262 263 cc182fe-cc18304 260->263 261->260 263->262
                                              APIs
                                              • SetThreadContext.KERNELBASE(?,00000000), ref: 0CC182EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: ContextThread
                                              • String ID:
                                              • API String ID: 1591575202-0
                                              • Opcode ID: e64eb2f7798f6609e9439bc64590533c6c21266ad6fe26c0125804b15b358eed
                                              • Instruction ID: 3c3c78d17369894fb0588387330eb908e0874cc2cbccf1d9e38005828e23ab0a
                                              • Opcode Fuzzy Hash: e64eb2f7798f6609e9439bc64590533c6c21266ad6fe26c0125804b15b358eed
                                              • Instruction Fuzzy Hash: E32127B1E046599FCB10CF9AC5457EEFBF4BB49310F15812AD418B3380D778A9448FA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0CC183B7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: MemoryProcessRead
                                              • String ID:
                                              • API String ID: 1726664587-0
                                              • Opcode ID: f9a84798f3757629e431e8a99e16551210146c021b329ab203d163e5f5089c76
                                              • Instruction ID: 0fbdeb6e67d418c1ccaa920bbde55ba2a5c05d22557a9176e0f7293c20fa3934
                                              • Opcode Fuzzy Hash: f9a84798f3757629e431e8a99e16551210146c021b329ab203d163e5f5089c76
                                              • Instruction Fuzzy Hash: ED21EFB59002499FCB10CF9AD884BDEBBF4FB48320F54842AE918A3350D378A954DFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetThreadContext.KERNELBASE(?,00000000), ref: 0CC182EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: ContextThread
                                              • String ID:
                                              • API String ID: 1591575202-0
                                              • Opcode ID: a646f74024dd1b05242cfad005225a8c913bbad7bdbac124aa6a9f92142bb0c4
                                              • Instruction ID: ee2bc8a581b04302681f9cd916c0a063f1052ee0fbbd512eb2677d38c20f00ee
                                              • Opcode Fuzzy Hash: a646f74024dd1b05242cfad005225a8c913bbad7bdbac124aa6a9f92142bb0c4
                                              • Instruction Fuzzy Hash: 7B2108B1E046599FCB10CF9AC5457EEFBF4BB49224F558129D818B3340D778A9448FA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0CC127C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 43823dd489dde571875c67870c5a8b337dc16a93b33f21e744a71bf4781361bf
                                              • Instruction ID: 154eef9b089b350bab049afa2b3044120f051086413acefc2319d2fc296b3e57
                                              • Opcode Fuzzy Hash: 43823dd489dde571875c67870c5a8b337dc16a93b33f21e744a71bf4781361bf
                                              • Instruction Fuzzy Hash: B92106B5D002499FCB10CF9AC884BDEBBF4FB49320F158429E858A7740D378A644DFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01219791,00000800,00000000,00000000), ref: 012199A2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: f2acf5b5617d42ace06152fa34fd826c018d3697f5c3ab7ecf0db8511fb8a8c8
                                              • Instruction ID: d40fdfbd343e590b38c364ead5b4ce22a4a5f8a114d26f4bb2ee016b4b9642c2
                                              • Opcode Fuzzy Hash: f2acf5b5617d42ace06152fa34fd826c018d3697f5c3ab7ecf0db8511fb8a8c8
                                              • Instruction Fuzzy Hash: BA1103B69002499FDB10CF9AC444AEEFBF5EB98314F00842AD555A7200C375A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01219791,00000800,00000000,00000000), ref: 012199A2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: b5a8190b39d8cf4e3c81a828ff1704ddafce72f26baf63afc7180006e77642ed
                                              • Instruction ID: 3c905d80688930b88bd927024916c812de9d36e47850e86d49e9b5ea0524b02e
                                              • Opcode Fuzzy Hash: b5a8190b39d8cf4e3c81a828ff1704ddafce72f26baf63afc7180006e77642ed
                                              • Instruction Fuzzy Hash: 641142B6D0024A8FDF10CFAAC444AEEFBF4AB98324F05842AD519B7200C378A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0CC127C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 3975f57f493b221facb4d4fbdf5dabcb9ec81b71ef8d0a1bf3b7021e69bb43fc
                                              • Instruction ID: 7cabea3e144b478a82415a7c8c56d4670481721e8ab22f0f379f942145662165
                                              • Opcode Fuzzy Hash: 3975f57f493b221facb4d4fbdf5dabcb9ec81b71ef8d0a1bf3b7021e69bb43fc
                                              • Instruction Fuzzy Hash: 3D21E4B59002499FCB10CF9AC484BDEFBF4FB48320F108429E958A7750D778A644DFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0CC18473
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 1909c199810feb47ddcf34a123146d3501f9b7b9f69139009d55aa84750589cc
                                              • Instruction ID: 56f7bc1f2a8c304c1a9bca80736361215dc5a6f673ca651e266d54f58ed5f9d7
                                              • Opcode Fuzzy Hash: 1909c199810feb47ddcf34a123146d3501f9b7b9f69139009d55aa84750589cc
                                              • Instruction Fuzzy Hash: DA1113B69006489FCB20CF9AD885BDEBFF4FB49320F108419E928A7750D735A954CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0CC18473
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: AllocVirtual
                                              • String ID:
                                              • API String ID: 4275171209-0
                                              • Opcode ID: 5cb96be030abac688fa6277a20f5195399f8f829cb8082b65bb9404ea786e73f
                                              • Instruction ID: 267644a5115ab85b4c3e0d50ebcabf495d26b611fe80f10aabe7acd0de8feb36
                                              • Opcode Fuzzy Hash: 5cb96be030abac688fa6277a20f5195399f8f829cb8082b65bb9404ea786e73f
                                              • Instruction Fuzzy Hash: F31122B59002889FCB10CF9AC884BDEBFF4FB49320F108419E928A7350C735A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 01219716
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 86cbf78222cab73adfb58cfcd0b10ba90d4b0692d9d8c53b514ff3e6cfcd6d07
                                              • Instruction ID: 70aaacf32c79fe98b4493f4ad9f6bbd346818562eab01f2125a6483187c29cef
                                              • Opcode Fuzzy Hash: 86cbf78222cab73adfb58cfcd0b10ba90d4b0692d9d8c53b514ff3e6cfcd6d07
                                              • Instruction Fuzzy Hash: 57110FB6D002898FDB10CF9AC444BDEFBF4AF88224F14842AD529B7204C374A545CFA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 0CC189E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: c408c2cc0c6f466b76abc955dfe804ac39511d3e5d590aefcea6a2a1b1ad6c39
                                              • Instruction ID: 2a3d63b31319a53137fb347856fa6cf3510271edb3d20bfa6d7e260b4f960350
                                              • Opcode Fuzzy Hash: c408c2cc0c6f466b76abc955dfe804ac39511d3e5d590aefcea6a2a1b1ad6c39
                                              • Instruction Fuzzy Hash: 971103B69003499FDB10CF9AC885BEEBBF8EB48324F108419E855A7740C374A944CFA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowLongW.USER32(?,?,?), ref: 0121FF9D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: LongWindow
                                              • String ID:
                                              • API String ID: 1378638983-0
                                              • Opcode ID: 82c0cd505ad174f5cc4848d2cec4fdafae5f14a4b4f677248f9aad2407f12f4f
                                              • Instruction ID: 441b676acdb969a12be3b00cc6c8748ffa670a602d82c20310508fdac5fe4c97
                                              • Opcode Fuzzy Hash: 82c0cd505ad174f5cc4848d2cec4fdafae5f14a4b4f677248f9aad2407f12f4f
                                              • Instruction Fuzzy Hash: 881122B58003498FDB10CF99D688BEEFBF4EB48324F14881AD958A7341C374A944CFA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 41c5c359f6390d779895945a4c1754af06272d045db7bb69a633768b34dd0c65
                                              • Instruction ID: b597d5f42c498714201e87ff5c98e2a219c7c23b508db3c7be8f1f5c159ceef4
                                              • Opcode Fuzzy Hash: 41c5c359f6390d779895945a4c1754af06272d045db7bb69a633768b34dd0c65
                                              • Instruction Fuzzy Hash: 191112B1D042488FCB10CF9AD485BDEBBF8EB49324F21841AD519A7740D775A944CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowLongW.USER32(?,?,?), ref: 0121FF9D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: LongWindow
                                              • String ID:
                                              • API String ID: 1378638983-0
                                              • Opcode ID: 6ac3b5dee4aedeb77fadf76b58e16e9a04068dce711a6caadad114e69a2d349f
                                              • Instruction ID: 65c412696788bf31b11842537f8a6b2a064cb34153de697c0d84e53b826db9ec
                                              • Opcode Fuzzy Hash: 6ac3b5dee4aedeb77fadf76b58e16e9a04068dce711a6caadad114e69a2d349f
                                              • Instruction Fuzzy Hash: 1A11E2B59002499FDB10CF9AD585BEEFBF8EB49324F10851AE969A7340C374A944CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • PostMessageW.USER32(?,?,?,?), ref: 0CC189E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: MessagePost
                                              • String ID:
                                              • API String ID: 410705778-0
                                              • Opcode ID: d7fb53f62690f01a090126dc13697ab2c8f90909935c25151e263cc4c75c3b26
                                              • Instruction ID: 376513c43639d18126130f03c39842e58b48932efdaaf3226b10ac848f7331bc
                                              • Opcode Fuzzy Hash: d7fb53f62690f01a090126dc13697ab2c8f90909935c25151e263cc4c75c3b26
                                              • Instruction Fuzzy Hash: 0A11E5B59043499FDB10CF9AC485BDEBFF8EB49324F108419D955A7740C374A944CFA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: ResumeThread
                                              • String ID:
                                              • API String ID: 947044025-0
                                              • Opcode ID: 58ad990ebebd5ca17b4c636fe97350c0d0bb166aec7b57fde3ddfad0a8516f22
                                              • Instruction ID: 4b3988f694c910c47d942324983c247fcafe74cd360121e218cce125041787f7
                                              • Opcode Fuzzy Hash: 58ad990ebebd5ca17b4c636fe97350c0d0bb166aec7b57fde3ddfad0a8516f22
                                              • Instruction Fuzzy Hash: 341123B19042488FCB10CF9AD484BDEFBF4EB49324F10841AD518A3340C774A944CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265270914.0000000000F8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_f8d000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3359d640d54cff400d58ddb5b520ab8e6ae6d1cc15240153b2a8411ccb4659ac
                                              • Instruction ID: 28fabf549f4383c2f9222186e4190e075281b51d0b4f6bc27c6b5d8d2e1c992c
                                              • Opcode Fuzzy Hash: 3359d640d54cff400d58ddb5b520ab8e6ae6d1cc15240153b2a8411ccb4659ac
                                              • Instruction Fuzzy Hash: B0216DB2904244DFDB05EF14D8C0B6ABF65FF84328F24C56AD9054F286C335D815E7A1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265306576.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_f9d000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 31ec19b187c055b6d1041bd8f4bdca5adb7d000133ca4c0a50cfb2781bea6e02
                                              • Instruction ID: 77c0233e1e9abfc77a41f2fd5eed195c1cf42ee3efbd3fbf53d01be621ea9204
                                              • Opcode Fuzzy Hash: 31ec19b187c055b6d1041bd8f4bdca5adb7d000133ca4c0a50cfb2781bea6e02
                                              • Instruction Fuzzy Hash: AF2137B2904244DFEF14CF24D8C0B2ABB65FB84324F30C569D90A4B25AC336D807EA61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265306576.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_f9d000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 501723338a5442a118aa706c7462481b000d71fc8fbde6d42c9ef89875b78119
                                              • Instruction ID: 0a8d7142e9c9b847a7936b3a417a3e9ad13030fc5489492f91c3c7fe8829b7cf
                                              • Opcode Fuzzy Hash: 501723338a5442a118aa706c7462481b000d71fc8fbde6d42c9ef89875b78119
                                              • Instruction Fuzzy Hash: 4B2129B6904244EFEF05DF10D9C0B2ABB65FB84324F34C56DE9094B246C336D846EB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265306576.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_f9d000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6a9730ef8cbaa66dc7caf92ba064cc77f515dfd60da185c9a3d80718336741f7
                                              • Instruction ID: 8324ba1473479c3c18492e2b43e562fb9a343161ee4183e66b4949dc44342b97
                                              • Opcode Fuzzy Hash: 6a9730ef8cbaa66dc7caf92ba064cc77f515dfd60da185c9a3d80718336741f7
                                              • Instruction Fuzzy Hash: 4F2192755093C08FDB02CF24D990715BF71EF46324F28C5EAD8498B6A7C33A980ADB62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265270914.0000000000F8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_f8d000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 98abe1bd786442cf91278a09081023498efb3f05c37cabdab074b36fb495d528
                                              • Instruction ID: 34574b56689a1aa61a5e0ed7db113bdb27db339a00b046ed765defcdcf5511ad
                                              • Opcode Fuzzy Hash: 98abe1bd786442cf91278a09081023498efb3f05c37cabdab074b36fb495d528
                                              • Instruction Fuzzy Hash: 1711E476804244CFCB02DF04D9C0B56BF71FF84324F28C1AAD8050B256C336D856DBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265306576.0000000000F9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_f9d000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 16c61bb5afbd5972eefcc089b1484a7a4c37a7b643b12c87c30c18ec8848ad14
                                              • Instruction ID: f89d021b1c66487f2a96561a797fcddd70e18f011d72a2a83cadd63374c22400
                                              • Opcode Fuzzy Hash: 16c61bb5afbd5972eefcc089b1484a7a4c37a7b643b12c87c30c18ec8848ad14
                                              • Instruction Fuzzy Hash: 5411BB75904280DFDF05CF10CAC0B15FBA1FB84324F28C6A9D8494B696C33AD84ADB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265270914.0000000000F8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_f8d000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e8bcc858a56cc50e2c1ae08978d22f2fdbe4ebcf1e67b874756a669a424f8c1a
                                              • Instruction ID: 555d5ba3d03600e70f522cdffbaac1d7e8cacabc61637244f039c54c201ad680
                                              • Opcode Fuzzy Hash: e8bcc858a56cc50e2c1ae08978d22f2fdbe4ebcf1e67b874756a669a424f8c1a
                                              • Instruction Fuzzy Hash: 0501DB725083849AE7105A26DC84BBEFBD8EF41374F18C55AED085A2CAC7799844E7B1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265270914.0000000000F8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F8D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_f8d000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: aa34cfc9b32c936bc0d9dc296ebb1e68bcf9fef7eccf64171658763aa2b61223
                                              • Instruction ID: 13faccf7344684ec5dde2b04e1dfaa65576ad86e2d17b193922fb1b75848af1d
                                              • Opcode Fuzzy Hash: aa34cfc9b32c936bc0d9dc296ebb1e68bcf9fef7eccf64171658763aa2b61223
                                              • Instruction Fuzzy Hash: 62F0F6714043849FEB208A16DCC4BA6FFA8EF41774F18C45AED084B286C379AC44DBB0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: z S$OAk
                                              • API String ID: 0-2212370184
                                              • Opcode ID: 90651ee8fae2e97783b5f6e27a5af21cf17496ee3e647b8c1d14b33876e24913
                                              • Instruction ID: 4eeecb1d67d550e4f2ceb098a94d91240c1ef12b7a0f6168b643cd347f52f845
                                              • Opcode Fuzzy Hash: 90651ee8fae2e97783b5f6e27a5af21cf17496ee3e647b8c1d14b33876e24913
                                              • Instruction Fuzzy Hash: F9514B71E1562ACBCB68CF26C9407E9B7B2FF89300F1192FAD50DA7614EB705A809F40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: z S$OAk
                                              • API String ID: 0-2212370184
                                              • Opcode ID: 1376e8c2adf5389f3fa8bc5e43a279d52f1a262dd1d97b946fddfebb0915aa11
                                              • Instruction ID: f93071ef7b95833aeab33bb7b0ae8b8b6fbd57ab395712e0af3599b18817791d
                                              • Opcode Fuzzy Hash: 1376e8c2adf5389f3fa8bc5e43a279d52f1a262dd1d97b946fddfebb0915aa11
                                              • Instruction Fuzzy Hash: 1C513A71E1161A8BCB68CF26C944799FBB2FF89300F1182FAD50DA7614EB705A81DF40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: z S$OAk
                                              • API String ID: 0-2212370184
                                              • Opcode ID: fdb059612abc51e22179c83c97052059cc005b8348b3a72738443b7cbe1db1d2
                                              • Instruction ID: 93245d63b623a929361dbea5fcb19978f306e05a1a02f3d2a9597cb0d32364ac
                                              • Opcode Fuzzy Hash: fdb059612abc51e22179c83c97052059cc005b8348b3a72738443b7cbe1db1d2
                                              • Instruction Fuzzy Hash: 4D510875E5161ACBCB64CF65C9847ADBBB2FF89300F1092EAD41AA7614EB305E80DF40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: z S$OAk
                                              • API String ID: 0-2212370184
                                              • Opcode ID: 5a24443fb7d626a1f193da7a98c62ba595b7923546c032b5fb3307682d11ea7c
                                              • Instruction ID: ca0576b75ce2b5a85c360e634bc533772489276eef215bba607bcf2ebec7cc2e
                                              • Opcode Fuzzy Hash: 5a24443fb7d626a1f193da7a98c62ba595b7923546c032b5fb3307682d11ea7c
                                              • Instruction Fuzzy Hash: 3B4117B1E5161BCBCB64CF26C9447A9B7B2FF89200F1192EAD509A7614EB709EC09F40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: z S$OAk
                                              • API String ID: 0-2212370184
                                              • Opcode ID: 109849e2bce3323f0d40523b2e39220c28aac3575f03c8f01203453e5b32d248
                                              • Instruction ID: ab4fa3b73ec6c2d8dbb284d2992d5115ccc1a5f064602669a0d28d33ebed7d1c
                                              • Opcode Fuzzy Hash: 109849e2bce3323f0d40523b2e39220c28aac3575f03c8f01203453e5b32d248
                                              • Instruction Fuzzy Hash: B64128B1E5161BCBCB64CF26C9407A9B7B2FF89300F1192EAD519A7614EB709EC09F40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 124aa3d4fc15422f89ccf34a191c1f1bbfda71d99faa798bd70689045359cfb4
                                              • Instruction ID: b79d15899cb6e8dd87fa5f593f7c3412e9e8147bbe9d95347ce4f397ec4be4e3
                                              • Opcode Fuzzy Hash: 124aa3d4fc15422f89ccf34a191c1f1bbfda71d99faa798bd70689045359cfb4
                                              • Instruction Fuzzy Hash: 4512E5F1411B468BD3B8CF65E9981893BA3B745328F91422CD2712BAD9D7B401EECF84
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: be98a9b8f1f13eff84187093f1b6d5c73a96b993cef332a0fb857791acd62c02
                                              • Instruction ID: 69f15dbe4ecbdbe0815aa72b8a2380c66a9cb8eccbb15dec5279e01171deac4c
                                              • Opcode Fuzzy Hash: be98a9b8f1f13eff84187093f1b6d5c73a96b993cef332a0fb857791acd62c02
                                              • Instruction Fuzzy Hash: 32A17236E1021ADFCF15DFA5C8445DEBBF2FF94300B15816AE905BB225EB31AA55CB40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.265900637.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_1210000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5728d4f76261fdc5cd965cbdb3b81acee7841a5fcb0b43073af97086ec1d4b1b
                                              • Instruction ID: bf67c25094dd9311d8791cd76b66c5c7d6dd7069eb870bd105799c18e781ba49
                                              • Opcode Fuzzy Hash: 5728d4f76261fdc5cd965cbdb3b81acee7841a5fcb0b43073af97086ec1d4b1b
                                              • Instruction Fuzzy Hash: 47C12AB14117468BD7A8CF65E9981893BB3BB85328F51432CD2712B6D8D7B410EECF84
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 91843fbc42a52cf16e1d272ba1645bcec1e6853be615990ef27e4384298edaf6
                                              • Instruction ID: 04e1cd584276a0b3439c2a04cea236432730cb77d8e26fa5024f45c42e72b0ea
                                              • Opcode Fuzzy Hash: 91843fbc42a52cf16e1d272ba1645bcec1e6853be615990ef27e4384298edaf6
                                              • Instruction Fuzzy Hash: 0B81E8B4E1524ACFCB44CFA6D4414AEFBF2FF8A210F50942AE816E7214D7349A46DF94
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 39851d27bab7de1998cba960247c56b5982930008829c7a139f29f57eb151f63
                                              • Instruction ID: 37cd0413ad1d318ed99d8d1e812e0fa70747d3dbfca4d5fbe5b3b149fd58a2c7
                                              • Opcode Fuzzy Hash: 39851d27bab7de1998cba960247c56b5982930008829c7a139f29f57eb151f63
                                              • Instruction Fuzzy Hash: 43513F70E151199BDB58CF9AD9805AEFBF2FF89304F24C16AD808A7305DB309A41DF65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1b1af7ab6b03e010ab1b1960dacc985f75046d68ee401c1a74682e29bf9d10db
                                              • Instruction ID: 0f8ee2ffb7abee29039409e8906e6769668f615ddbfa8f0d2f27a3949f59d353
                                              • Opcode Fuzzy Hash: 1b1af7ab6b03e010ab1b1960dacc985f75046d68ee401c1a74682e29bf9d10db
                                              • Instruction Fuzzy Hash: A4519AB1E056598FEB58CF6BCD4578AFBF3AFC9200F15C1AA844CAA265DB3409858F11
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.280265248.000000000CC10000.00000040.00000800.00020000.00000000.sdmp, Offset: 0CC10000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_cc10000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 087e216c9662143a43583e350f762b6438ca0f1172b41aba43f192ace0f7a607
                                              • Instruction ID: 98585457a3d2712717310af152f2a9c51ed99e95271a25cd0aae77c68f851e8e
                                              • Opcode Fuzzy Hash: 087e216c9662143a43583e350f762b6438ca0f1172b41aba43f192ace0f7a607
                                              • Instruction Fuzzy Hash: 67515971E056588BEB68CF6BCD4479EFAF3AFC9301F14C1BA890DA6254DB340A858F11
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Execution Graph

                                              Execution Coverage:11.2%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:6.2%
                                              Total number of Nodes:64
                                              Total number of Limit Nodes:2
                                              execution_graph 41298 6137850 41302 613786f 41298->41302 41299 6137ad9 41301 6136200 RegQueryValueExW 41301->41302 41302->41299 41302->41301 41303 61361f4 41302->41303 41304 6137b68 RegOpenKeyExW 41303->41304 41306 6137c2e 41304->41306 41307 613c200 41310 613c21b 41307->41310 41311 613c5ed 41310->41311 41312 613b820 LdrInitializeThunk 41310->41312 41313 6137dd0 RegQueryValueExW 41310->41313 41312->41310 41313->41310 41314 f9add0 41315 f9adee 41314->41315 41318 f99dc0 41315->41318 41317 f9ae25 41319 f9c8f0 LoadLibraryA 41318->41319 41321 f9c9cc 41319->41321 41331 f94540 41332 f94554 41331->41332 41335 f9478a 41332->41335 41333 f9455d 41336 f94793 41335->41336 41341 f9496c 41335->41341 41346 f94986 41335->41346 41351 f94870 41335->41351 41356 f9485f 41335->41356 41336->41333 41342 f9491f 41341->41342 41343 f949ab 41342->41343 41361 f94c78 41342->41361 41366 f94c67 41342->41366 41347 f94999 41346->41347 41348 f949ab 41346->41348 41349 f94c78 2 API calls 41347->41349 41350 f94c67 2 API calls 41347->41350 41349->41348 41350->41348 41352 f948b4 41351->41352 41353 f949ab 41352->41353 41354 f94c78 2 API calls 41352->41354 41355 f94c67 2 API calls 41352->41355 41354->41353 41355->41353 41357 f948b4 41356->41357 41358 f949ab 41357->41358 41359 f94c78 2 API calls 41357->41359 41360 f94c67 2 API calls 41357->41360 41359->41358 41360->41358 41362 f94c86 41361->41362 41371 f94cc8 41362->41371 41375 f94cb7 41362->41375 41363 f94c96 41363->41343 41367 f94c86 41366->41367 41369 f94cc8 RtlEncodePointer 41367->41369 41370 f94cb7 RtlEncodePointer 41367->41370 41368 f94c96 41368->41343 41369->41368 41370->41368 41372 f94d02 41371->41372 41373 f94d2c RtlEncodePointer 41372->41373 41374 f94d55 41372->41374 41373->41374 41374->41363 41376 f94d02 41375->41376 41377 f94d2c RtlEncodePointer 41376->41377 41378 f94d55 41376->41378 41377->41378 41378->41363 41322 613b8b8 41323 613b8d7 41322->41323 41326 613bae0 41323->41326 41324 613b8f5 41327 613bb01 41326->41327 41328 613bb24 LdrInitializeThunk 41326->41328 41327->41324 41330 613bb93 41328->41330
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 345b23e73aae96dacecb43d0da9f5ba9e1a9ae9045f1f8a20bdada138af5210a
                                              • Instruction ID: 785ae423917e6ac9d783b6d8e33594748d7aebd82176aee1784c90f6a6d6bfe6
                                              • Opcode Fuzzy Hash: 345b23e73aae96dacecb43d0da9f5ba9e1a9ae9045f1f8a20bdada138af5210a
                                              • Instruction Fuzzy Hash: 5A633D70D107598ECB51EF68C850AA9F7B1FF85300F12D69AE459B7221EB70AAC5CF81
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512518375.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6130000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: 6f84e9c5da5df74128976ee0299b72da50c73b7c1dae529e280ba06c94e8bd33
                                              • Instruction ID: 7bc6f020211f9e3e640780a1182fdd1cb075c831696004b601299f6863d1f65e
                                              • Opcode Fuzzy Hash: 6f84e9c5da5df74128976ee0299b72da50c73b7c1dae529e280ba06c94e8bd33
                                              • Instruction Fuzzy Hash: 2331BE30A08389DFDB55DF74C898A9EBBB1FF55304F2488A9D041AB296EB34D846CB40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9a3e3dd041a11518975916a203634c292551357d8f12f14d767ef9dd7444a8c4
                                              • Instruction ID: 8bfe633a6e26f6672ada464b2c7b6be9d1e0488fa71fd8439833588a9c43110c
                                              • Opcode Fuzzy Hash: 9a3e3dd041a11518975916a203634c292551357d8f12f14d767ef9dd7444a8c4
                                              • Instruction Fuzzy Hash: A3921330F002498FDB649B68C895FAEB7F2AB86314F168469E905EB391DB34DC45C7D1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 00a4843a4f4d5a09bab43b7792e56e17e7c3fa9096339484efe1dd6a3d6146fc
                                              • Instruction ID: d80d31ab64d6e21c7344ce4933f2f8ddd6237de73ba835f2d1cf90d7fd06ee44
                                              • Opcode Fuzzy Hash: 00a4843a4f4d5a09bab43b7792e56e17e7c3fa9096339484efe1dd6a3d6146fc
                                              • Instruction Fuzzy Hash: 6A72A330E002488FDB68DF64C854BADBBB5AF86304F168469E809EF395DB75DC49CB91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 10abb54589ef3606b8ae3c88969ee0838d0ab4360ca9c6e4863fa985a3631c36
                                              • Instruction ID: 22412ea33a7a94e04074c74b100cfd5229967d7abc4100a94242be056f8a8634
                                              • Opcode Fuzzy Hash: 10abb54589ef3606b8ae3c88969ee0838d0ab4360ca9c6e4863fa985a3631c36
                                              • Instruction Fuzzy Hash: 6832B730E002888FEB64DB74C454BADB7B1EF86304F15C569D409AF296DB75DC49CB91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 27d2036f6e65d823ffeff5479d91aff3a2bf1c785d84a551cee1de65001d2184
                                              • Instruction ID: 3c16b36ec245bbec733ed413282fa7d4c5fa19ce7d10b3c0c0072f5e427e3f95
                                              • Opcode Fuzzy Hash: 27d2036f6e65d823ffeff5479d91aff3a2bf1c785d84a551cee1de65001d2184
                                              • Instruction Fuzzy Hash: 58F1E130B043849FDB54DBB4CC51B6EBBF2AF89304F1680A9E505EB292DA34DD05CB91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 95baabe99aaa5de5fc58abb708b66b8560fa51003fe4e65a9e8b7cc91c9f839d
                                              • Instruction ID: bcb9d9a3506eac6f1909a712420da75547961a401ec039cc55ca9e9efb518b39
                                              • Opcode Fuzzy Hash: 95baabe99aaa5de5fc58abb708b66b8560fa51003fe4e65a9e8b7cc91c9f839d
                                              • Instruction Fuzzy Hash: B2D1F430E002588FEB64DB74C854BAEB6F6AF85344F168469D806AB391DF70DD49CBC1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 124 6137dd0-6137ddf 125 6137de1-6137deb 124->125 126 6137e04-6137e89 124->126 127 6137e00-6137e03 125->127 128 6137ded-6137dfe 125->128 133 6137e91-6137e9b 126->133 134 6137e8b-6137e8e 126->134 128->127 135 6137ea7-6137ee9 RegQueryValueExW 133->135 136 6137e9d-6137ea5 133->136 134->133 137 6137ef2-6137f2c 135->137 138 6137eeb-6137ef1 135->138 136->135 142 6137f36 137->142 143 6137f2e 137->143 138->137 144 6137f37 142->144 143->142 144->144
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06137ED9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512518375.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6130000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID: &oS$3
                                              • API String ID: 3660427363-648018119
                                              • Opcode ID: 7d5a2e1f26815f3fff05c7cc2d999a310b4e74c4854e73b88d769279959c167a
                                              • Instruction ID: 5a35f009be0d294ccbb51d613eb775d5a895f6557b5a1475be20eab86e5ba4df
                                              • Opcode Fuzzy Hash: 7d5a2e1f26815f3fff05c7cc2d999a310b4e74c4854e73b88d769279959c167a
                                              • Instruction Fuzzy Hash: 5F5157B1E043589FCB51CFAAC984ADEBBF5BF48310F15806AE819AB341D7749905CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 164 f9c8e4-f9c947 166 f9c949-f9c953 164->166 167 f9c980-f9c9ca LoadLibraryA 164->167 166->167 168 f9c955-f9c957 166->168 172 f9c9cc-f9c9d2 167->172 173 f9c9d3-f9ca04 167->173 170 f9c959-f9c963 168->170 171 f9c97a-f9c97d 168->171 174 f9c965 170->174 175 f9c967-f9c976 170->175 171->167 172->173 179 f9ca14 173->179 180 f9ca06-f9ca0a 173->180 174->175 175->175 176 f9c978 175->176 176->171 182 f9ca15 179->182 180->179 181 f9ca0c 180->181 181->179 182->182
                                              APIs
                                              • LoadLibraryA.KERNELBASE(?), ref: 00F9C9BA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.509662459.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_f90000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID: &oS$&oS
                                              • API String ID: 1029625771-3499633702
                                              • Opcode ID: 9c012022885a1517c42eaf8ee7470530803d880185123e7b9cb20dafdf5f8f90
                                              • Instruction ID: 6b53229e7ab3455681cd3def1ee9c8baa7f789ea1ded903279987015552a6ae0
                                              • Opcode Fuzzy Hash: 9c012022885a1517c42eaf8ee7470530803d880185123e7b9cb20dafdf5f8f90
                                              • Instruction Fuzzy Hash: 6E3162B1D002499FEF14CFA8C99579EBFF1BB08720F14852AE816A7380D7749885CF92
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 145 f99dc0-f9c947 147 f9c949-f9c953 145->147 148 f9c980-f9c9ca LoadLibraryA 145->148 147->148 149 f9c955-f9c957 147->149 153 f9c9cc-f9c9d2 148->153 154 f9c9d3-f9ca04 148->154 151 f9c959-f9c963 149->151 152 f9c97a-f9c97d 149->152 155 f9c965 151->155 156 f9c967-f9c976 151->156 152->148 153->154 160 f9ca14 154->160 161 f9ca06-f9ca0a 154->161 155->156 156->156 157 f9c978 156->157 157->152 163 f9ca15 160->163 161->160 162 f9ca0c 161->162 162->160 163->163
                                              APIs
                                              • LoadLibraryA.KERNELBASE(?), ref: 00F9C9BA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.509662459.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_f90000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID: &oS$&oS
                                              • API String ID: 1029625771-3499633702
                                              • Opcode ID: 0d5c7eb367bef4d3fe4cb01d702def00e2b5230c9c1b7bb3a5b85057c64d1c89
                                              • Instruction ID: 513c836bab2c2bf5602e81f32ac17dc01f33bb32fb3ad87b69a0cff9f4e153c0
                                              • Opcode Fuzzy Hash: 0d5c7eb367bef4d3fe4cb01d702def00e2b5230c9c1b7bb3a5b85057c64d1c89
                                              • Instruction Fuzzy Hash: 6C3144B1D002499FEF14CFA9C99579EBFF1BB08714F108129E815A7380D7749845DF95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 183 6136210-6136259 189 61361e4-6136207 183->189 190 613625b-6136260 183->190 197 6137e20-6137e89 189->197 191 6136262-61362a3 190->191 192 61362a6-61362dc 190->192 191->192 192->197 202 6137e91-6137e9b 197->202 203 6137e8b-6137e8e 197->203 205 6137ea7-6137ee9 RegQueryValueExW 202->205 206 6137e9d-6137ea5 202->206 203->202 207 6137ef2-6137f2c 205->207 208 6137eeb-6137ef1 205->208 206->205 214 6137f36 207->214 215 6137f2e 207->215 208->207 216 6137f37 214->216 215->214 216->216
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06137ED9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512518375.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6130000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID: &oS
                                              • API String ID: 3660427363-3291879652
                                              • Opcode ID: 8baa54018c3c8c588055cb9b0e8a54dd5aedc9c8969d46394308b5bb5aa7c248
                                              • Instruction ID: 68386a1b94b86799fc2f7fc62047613ee472b33b48b878404d773c57035e9118
                                              • Opcode Fuzzy Hash: 8baa54018c3c8c588055cb9b0e8a54dd5aedc9c8969d46394308b5bb5aa7c248
                                              • Instruction Fuzzy Hash: 0F51C572C093A89FCB01DFA9C8E4BEEBFB1AF05204F05446AD449EB251D734C905CBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 217 6137b08-6137b27 218 6137b29-6137b33 217->218 219 6137b4c-6137bb8 217->219 220 6137b35-6137b46 218->220 221 6137b48-6137b4b 218->221 224 6137bc0 219->224 225 6137bba-6137bbd 219->225 220->221 226 6137bca-6137c2c RegOpenKeyExW 224->226 225->224 227 6137c35-6137c6d 226->227 228 6137c2e-6137c34 226->228 232 6137c80 227->232 233 6137c6f-6137c78 227->233 228->227 234 6137c81 232->234 233->232 234->234
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 06137C1C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512518375.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6130000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID: &oS
                                              • API String ID: 71445658-3291879652
                                              • Opcode ID: 10cd802ab8da1b322d5d9a8f0bea62d6f24314f38502dc1bef82736c698dc6e2
                                              • Instruction ID: ba6ccbe7ee3ac239e37be86e7924264dc1769788b572dd9c27ea3db29224e0d4
                                              • Opcode Fuzzy Hash: 10cd802ab8da1b322d5d9a8f0bea62d6f24314f38502dc1bef82736c698dc6e2
                                              • Instruction Fuzzy Hash: 80418AB0D0538A8FDB00CFA8C584A9EFFF1AF49304F29C06AE409AB345C7749885CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 235 61361e8-6137e89 239 6137e91-6137e9b 235->239 240 6137e8b-6137e8e 235->240 241 6137ea7-6137ee9 RegQueryValueExW 239->241 242 6137e9d-6137ea5 239->242 240->239 243 6137ef2-6137f2c 241->243 244 6137eeb-6137ef1 241->244 242->241 248 6137f36 243->248 249 6137f2e 243->249 244->243 250 6137f37 248->250 249->248 250->250
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06137ED9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512518375.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6130000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID: &oS
                                              • API String ID: 3660427363-3291879652
                                              • Opcode ID: 2bc721d1477f2caa010ec9de6074ab2f856139b62c8def501843ef6d8afaed50
                                              • Instruction ID: 8b27b9c02f204428b9940e134503d15bd526702cd89601b9887e5bb3309ba3e8
                                              • Opcode Fuzzy Hash: 2bc721d1477f2caa010ec9de6074ab2f856139b62c8def501843ef6d8afaed50
                                              • Instruction Fuzzy Hash: FC4122B1D003689FCB10CFAAC984ADEBBF5BF48310F15802AE819AB340D7749945CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 251 6137e15-6137e89 254 6137e91-6137e9b 251->254 255 6137e8b-6137e8e 251->255 256 6137ea7-6137ee9 RegQueryValueExW 254->256 257 6137e9d-6137ea5 254->257 255->254 258 6137ef2-6137f2c 256->258 259 6137eeb-6137ef1 256->259 257->256 263 6137f36 258->263 264 6137f2e 258->264 259->258 265 6137f37 263->265 264->263 265->265
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06137ED9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512518375.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6130000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID: &oS
                                              • API String ID: 3660427363-3291879652
                                              • Opcode ID: 3bbf50f0890b4e26fbdcd4a01d84112b6b8502083c0b924795fda12e162d5559
                                              • Instruction ID: 421e931b885583bbf111f605ee357ed696e355432d7da9cdd64de21d4fe96a58
                                              • Opcode Fuzzy Hash: 3bbf50f0890b4e26fbdcd4a01d84112b6b8502083c0b924795fda12e162d5559
                                              • Instruction Fuzzy Hash: BC3101B1D002699FCB10CF9AC984ADEBBF5BF48314F15842AE819BB344D7349945CFA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 266 6136200-6137e89 269 6137e91-6137e9b 266->269 270 6137e8b-6137e8e 266->270 271 6137ea7-6137ee9 RegQueryValueExW 269->271 272 6137e9d-6137ea5 269->272 270->269 273 6137ef2-6137f2c 271->273 274 6137eeb-6137ef1 271->274 272->271 278 6137f36 273->278 279 6137f2e 273->279 274->273 280 6137f37 278->280 279->278 280->280
                                              APIs
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06137ED9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512518375.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6130000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: QueryValue
                                              • String ID: &oS
                                              • API String ID: 3660427363-3291879652
                                              • Opcode ID: d43d2a00ab2f67b7744d4e7f93777a8a8b9aeb6016aa685f0ee24e4c9b7d75ad
                                              • Instruction ID: baf281c4dcdbb2eb18c61b748f0babf0bdc76888fb4da9401ca7dcfc36b68fa0
                                              • Opcode Fuzzy Hash: d43d2a00ab2f67b7744d4e7f93777a8a8b9aeb6016aa685f0ee24e4c9b7d75ad
                                              • Instruction Fuzzy Hash: 4531FFB1D003689FCB20CF9AC984ADEBBF5BF48310F55802AE819AB344D7749945CFA4
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 281 61361f4-6137bb8 283 6137bc0-6137c2c RegOpenKeyExW 281->283 284 6137bba-6137bbd 281->284 286 6137c35-6137c6d 283->286 287 6137c2e-6137c34 283->287 284->283 291 6137c80 286->291 292 6137c6f-6137c78 286->292 287->286 293 6137c81 291->293 292->291 293->293
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 06137C1C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512518375.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6130000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID: &oS
                                              • API String ID: 71445658-3291879652
                                              • Opcode ID: 787797a3e336cbdca29fbe4a4fa0d7ebe347f127ca7e513a4722b43c9ef93a9c
                                              • Instruction ID: e5757aa14cd35fbe9488a9fffcc192b8e66c4b3c8ebd0c498dd6ecc1c84ab01f
                                              • Opcode Fuzzy Hash: 787797a3e336cbdca29fbe4a4fa0d7ebe347f127ca7e513a4722b43c9ef93a9c
                                              • Instruction Fuzzy Hash: 34310DB1D0439A8FDB10CF99C584A8EFBF5AF48314F29856AE809AB345C7759884CB94
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 294 f94cb7-f94d0a 297 f94d0c-f94d0e 294->297 298 f94d10 294->298 299 f94d15-f94d20 297->299 298->299 300 f94d81-f94d8e 299->300 301 f94d22-f94d53 RtlEncodePointer 299->301 303 f94d5c-f94d7c 301->303 304 f94d55-f94d5b 301->304 303->300 304->303
                                              APIs
                                              • RtlEncodePointer.NTDLL(00000000), ref: 00F94D42
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.509662459.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_f90000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: EncodePointer
                                              • String ID: &oS
                                              • API String ID: 2118026453-3291879652
                                              • Opcode ID: d4dc8d11bf897dacbf7d8335c2347eb8a0ffae6ede3670e1556bf6d7084384cf
                                              • Instruction ID: 56987652fd31006e14b4e72e077bbe1e7cc29308a48f43f77569d778ce8d1b14
                                              • Opcode Fuzzy Hash: d4dc8d11bf897dacbf7d8335c2347eb8a0ffae6ede3670e1556bf6d7084384cf
                                              • Instruction Fuzzy Hash: 61219AB58007468FDF20DF98CA1979EBBF4FB18328F24846AD805A7A41D73965468F61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 306 f94cc8-f94d0a 309 f94d0c-f94d0e 306->309 310 f94d10 306->310 311 f94d15-f94d20 309->311 310->311 312 f94d81-f94d8e 311->312 313 f94d22-f94d53 RtlEncodePointer 311->313 315 f94d5c-f94d7c 313->315 316 f94d55-f94d5b 313->316 315->312 316->315
                                              APIs
                                              • RtlEncodePointer.NTDLL(00000000), ref: 00F94D42
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.509662459.0000000000F90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_f90000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: EncodePointer
                                              • String ID: &oS
                                              • API String ID: 2118026453-3291879652
                                              • Opcode ID: eacf593c007f96552dc15d7dc15a000b25430028f14ddfa8ac1831f578bdb28a
                                              • Instruction ID: 7a6000bc3afc6635340010e70d2bc466ef463061eed9cc4cf5661b26427e23ac
                                              • Opcode Fuzzy Hash: eacf593c007f96552dc15d7dc15a000b25430028f14ddfa8ac1831f578bdb28a
                                              • Instruction Fuzzy Hash: E311AC759017468FDF20DFA9D90879EBBF4FB58324F20842AD404A3B40DB38A945CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512518375.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6130000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: 4ffd4d45560d6e9b09fd0f40200ca95caa2489316d811b8ed80f3a6b1a45d22e
                                              • Instruction ID: 91d3fa6bfb28f46e7d0ddc6cf30bc765fe779142d9cb9b32d045bfecbba285bb
                                              • Opcode Fuzzy Hash: 4ffd4d45560d6e9b09fd0f40200ca95caa2489316d811b8ed80f3a6b1a45d22e
                                              • Instruction Fuzzy Hash: 42715C34E04219DFDB54DFB4D959BAEBBB2AF94305F108829D006A7364EF34D945DB80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4790fa832ad4b0ff776db1d16782784a80cf7a4300c5fc0eaa9b6867a5df001c
                                              • Instruction ID: 63ba8b9511e4fec7491ff5723e079bf17006c60f9845e4ac154a41ccfe0cec1f
                                              • Opcode Fuzzy Hash: 4790fa832ad4b0ff776db1d16782784a80cf7a4300c5fc0eaa9b6867a5df001c
                                              • Instruction Fuzzy Hash: 41F1EB71F101284FDFA09A68C494FAEB7A6DF85354F264426EC06EB350DA35DC89CBD2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 52f03765d3e45e47018b6d7f76f22d8f2e496a9ecc2e999009036ba87f4b977d
                                              • Instruction ID: 517189ff8b752dfbdb39247286d9708412a81c7ae3b647510deded2c9cdc5e20
                                              • Opcode Fuzzy Hash: 52f03765d3e45e47018b6d7f76f22d8f2e496a9ecc2e999009036ba87f4b977d
                                              • Instruction Fuzzy Hash: 88F1B234B146518FEBA59A39C854F3937AAAF81604F1B406AED02CF7A1DE29CC85C7D1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9dcc3c24ec52cd03162f1f9b2bf2eb218139eafc8a4a842c34b1d9ab7eb4b4f0
                                              • Instruction ID: 14ee385cf48d1b8a634cae755400e78e495ee0366e24e62d5104c397a7699886
                                              • Opcode Fuzzy Hash: 9dcc3c24ec52cd03162f1f9b2bf2eb218139eafc8a4a842c34b1d9ab7eb4b4f0
                                              • Instruction Fuzzy Hash: D4D1F430A002098FCB54CF68C454AAEBBF6EF85314F26846AD959DB792DB34EC45CBD1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f5af7c1d647dae8eddc03e97467b97aa866e5259395e82442ee420bf137dea5a
                                              • Instruction ID: b93be892390d3687b8ef4606cc20e1f6249232e92c8da50c5bd2b47251b74d60
                                              • Opcode Fuzzy Hash: f5af7c1d647dae8eddc03e97467b97aa866e5259395e82442ee420bf137dea5a
                                              • Instruction Fuzzy Hash: BCB1E130B001599FDB54DB74C869F6F77A6AB88344F1A8428E906DB295DF70DD028BE2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bfe8bb5aa3e98ab4fa2dee21e7fce43f71f93416735f6bd95196d58d9e2a11e7
                                              • Instruction ID: 287cc91d1dc76470dde240f1dad0b1f95645e7c6aa418416fe132efb98ecffef
                                              • Opcode Fuzzy Hash: bfe8bb5aa3e98ab4fa2dee21e7fce43f71f93416735f6bd95196d58d9e2a11e7
                                              • Instruction Fuzzy Hash: 79B1DF30B002149FDB409B70ED19F6EBBE2AF84325F158665E916DB3E4DF34880ADB81
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 118281ec2c8331ed21deca1747bdc49875e5aaec785d1507cf802d5d63cdfb54
                                              • Instruction ID: 5d79b327933917ccbb34872d8458d635ee3d2418a7a8d041a0c86b2eab04c2b0
                                              • Opcode Fuzzy Hash: 118281ec2c8331ed21deca1747bdc49875e5aaec785d1507cf802d5d63cdfb54
                                              • Instruction Fuzzy Hash: 78C1EE31A04249DFCF51CFA4C844AEDBBB1FF89310F16816AE845EB351D735A959CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f422f667e2d09855396f5733739b5bed3bc84fe70ceccd9c3609e8e1eb2708db
                                              • Instruction ID: 9893c7a56d814409ec8f3801c441ee61f510b4977fddf535ee7dd50a2a99e91b
                                              • Opcode Fuzzy Hash: f422f667e2d09855396f5733739b5bed3bc84fe70ceccd9c3609e8e1eb2708db
                                              • Instruction Fuzzy Hash: 90B1E871A006458FCB44DF7CC88499DBBB1FF89304B0686A9D915AF366EB70E949CF80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e6b41028e478c494c2ffdd67c4e5ca154abe3c6df5866156498879b4189a6e1b
                                              • Instruction ID: 40c3bc0a1cadef1545b78971ea21e2ccb487590a711be2f37d0b71b07b082965
                                              • Opcode Fuzzy Hash: e6b41028e478c494c2ffdd67c4e5ca154abe3c6df5866156498879b4189a6e1b
                                              • Instruction Fuzzy Hash: 0381B530B002048FDB499BB4D925BAE77F6AFC9304F198429E806DB795DF34DC4A8B91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fad2a5cc1f29fee627c631a1be7f2c459b8a074e3e74bcc21d5016a8d2a0a36a
                                              • Instruction ID: 31c5ae0a1c00861daaf68167e01eabdb1df8525066ea5d1c750a385fea33f95a
                                              • Opcode Fuzzy Hash: fad2a5cc1f29fee627c631a1be7f2c459b8a074e3e74bcc21d5016a8d2a0a36a
                                              • Instruction Fuzzy Hash: 9B81B430B04281DFDB61CB68C944B9DB7A2AF89304F29C1AAD81D9F3D6DB75C849C791
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ba0e724a1584793491372f6a73073811735e62e037392486fcc7d31689045dfe
                                              • Instruction ID: dec588056048f1808b4b0b1dfbf5b3b8ee2ee129a337868cc4f4614c1503401d
                                              • Opcode Fuzzy Hash: ba0e724a1584793491372f6a73073811735e62e037392486fcc7d31689045dfe
                                              • Instruction Fuzzy Hash: B9A18771A10605CFCB44EF68C88499DFBB1FF89304B1186A9E915AF365EB70E985CF80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bdfc124f6c5a8d2da217306ed430a14a5b8e1015f23bba2ab4e4cdb4149e5db8
                                              • Instruction ID: 7e292fbf4c48656119985d0c9a58066c7bc9368c7b1778dccd662f6074f3e133
                                              • Opcode Fuzzy Hash: bdfc124f6c5a8d2da217306ed430a14a5b8e1015f23bba2ab4e4cdb4149e5db8
                                              • Instruction Fuzzy Hash: 1E718230F002048FDB489BB4D929BAE76E7AFC9344F158429E806DB794DF34DC4A8B91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 88610888442b05d4a8782c092ff725ece5e4f322f188be11b05bf77cd21d82e6
                                              • Instruction ID: c3bd2c4d714cda1573f0b3b85c50ddcc99cf461c415e28a74f7cf4589a30ac5e
                                              • Opcode Fuzzy Hash: 88610888442b05d4a8782c092ff725ece5e4f322f188be11b05bf77cd21d82e6
                                              • Instruction Fuzzy Hash: 4F61FF30B002889FE714AB74C859BAEBAE7AFC5344F19C429E416AF391DF75DC458781
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4a61f5b8b33c2df8606145853e37aa150a62d170f1acf73c46281eb8735e73ec
                                              • Instruction ID: aa0b0b9b39ee3428fe4a76adca8251a7b9d73d1e6966977d82ca66c2efcabd6d
                                              • Opcode Fuzzy Hash: 4a61f5b8b33c2df8606145853e37aa150a62d170f1acf73c46281eb8735e73ec
                                              • Instruction Fuzzy Hash: 69615E70E007498FDB55CFA5C540BEEBBF2EF49310F268659D815AB341E770A989CB80
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d1f0b176020bddb0d0cfa871853b52041005c7f1b21aea63d33d4db03afcf3f4
                                              • Instruction ID: 89084fe11b3b2c223167c68be7a25506f3bdd06a594af591764cbb9555adeefe
                                              • Opcode Fuzzy Hash: d1f0b176020bddb0d0cfa871853b52041005c7f1b21aea63d33d4db03afcf3f4
                                              • Instruction Fuzzy Hash: A3516171E007899FDF11CFA5C540ADEBBF2EF49300F264659E845AB341E770A985CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: be7276831b0ea96dd971f0c97e34ba9c19f07ae020a695c3900164e1f9db0595
                                              • Instruction ID: 3fbe3c7629a42c0c8516ad2d754a7fb0b7b7c6d427677b49c0d60ed3a2b4186d
                                              • Opcode Fuzzy Hash: be7276831b0ea96dd971f0c97e34ba9c19f07ae020a695c3900164e1f9db0595
                                              • Instruction Fuzzy Hash: 05418F31F002058FDB589BB4D929BBE76E6AF88341F254429E806DB790DF35CC468BD2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 93c0292652ddc2a599272f9feb457bdc3d6e5cd57b57f47e24def76e6f6e5ce9
                                              • Instruction ID: efa86b200ecdc8365aaeee2ae5e9103befcf3ade503472dc8ec8f294a9d52970
                                              • Opcode Fuzzy Hash: 93c0292652ddc2a599272f9feb457bdc3d6e5cd57b57f47e24def76e6f6e5ce9
                                              • Instruction Fuzzy Hash: 3B419831A14249DFCF51CFA4C844B9EBBB2AF4A310F068156EC55EB6A1D334E954CBE0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42c4e180a96c7868f9b06716d837ab1b6cb24d19e23ef235320018e658f744f1
                                              • Instruction ID: 42e68644b0c4f691a1834600c73d88e63442ef1023d0da85a92f38de2f0c0c79
                                              • Opcode Fuzzy Hash: 42c4e180a96c7868f9b06716d837ab1b6cb24d19e23ef235320018e658f744f1
                                              • Instruction Fuzzy Hash: 1F311535B106058FCB58DF38C898E6E7BE5AF89654B1A00A9E906CB371DB35EC05CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 74edab30132987ba311db0d56a3f2a2373eddc2fb9d1d656571a4cfdf9930cce
                                              • Instruction ID: 65127ade9c18558fefbeab676e11de50a7df913ffecd5f1de72c3a4ed296d09e
                                              • Opcode Fuzzy Hash: 74edab30132987ba311db0d56a3f2a2373eddc2fb9d1d656571a4cfdf9930cce
                                              • Instruction Fuzzy Hash: E2315635F052048FCB909B78DC14A9EB7F5EFC5244F1580BAD949DB342EB348C0A8791
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ba9308dabc6187efbb9aeac388865db506964665a1f9745cfd87734d0ca3b4a4
                                              • Instruction ID: f275650cd290816fc23d94438d796bd495d1d8274261d8948683630143615826
                                              • Opcode Fuzzy Hash: ba9308dabc6187efbb9aeac388865db506964665a1f9745cfd87734d0ca3b4a4
                                              • Instruction Fuzzy Hash: 2B213330F142448FDB94DB28D848F6FB7A2AB85710F1A8169E818CB251DB30DE56CBD1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 49a69f630a74551c249f0b6728c50a33ae233c6d4fbcf52308354f6a26ff7bd3
                                              • Instruction ID: 9d52129f21a1a023ecb5571a89eb175ffd697271b39000e6bafa5f8377581204
                                              • Opcode Fuzzy Hash: 49a69f630a74551c249f0b6728c50a33ae233c6d4fbcf52308354f6a26ff7bd3
                                              • Instruction Fuzzy Hash: 2F218970A0436ADFDB28DFA1E884FAEBBB5EF44304F104029E801A7345CB758985CB90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dd2c7ef7373569616c377e4cf8110f5f6051f1aa76abc232d97c9a861cd22491
                                              • Instruction ID: b66dd84a4f71490f3e1140576ad71a581115569cf1d1a4d8d127728b976f16fb
                                              • Opcode Fuzzy Hash: dd2c7ef7373569616c377e4cf8110f5f6051f1aa76abc232d97c9a861cd22491
                                              • Instruction Fuzzy Hash: 8D216670E042899FCB59CFA1D494EEDBFB2EF48305F248029E801A7255DB35DA86DF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 982b8141a2d23f8a67e7cda8feabd48207fe8b4306f68d854b38f88ed4210ea0
                                              • Instruction ID: 44b33079815edc7a6a3ea89c8b224c035f5d4cdaf159a10df44483b7fd10f113
                                              • Opcode Fuzzy Hash: 982b8141a2d23f8a67e7cda8feabd48207fe8b4306f68d854b38f88ed4210ea0
                                              • Instruction Fuzzy Hash: 5711D331A002499BDB90CFA8CC45F9EBBA2EF85350F068255D8189B691D371F814C7D4
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 06d603fafa4cab8b94a110e3e38a4bd257f1dbdc36bcfa32c6d0c0775f8f667b
                                              • Instruction ID: bff0322b340d0e3d60d1b6e6b724fb265e1e6d89512f48dcec69a6403e853dc6
                                              • Opcode Fuzzy Hash: 06d603fafa4cab8b94a110e3e38a4bd257f1dbdc36bcfa32c6d0c0775f8f667b
                                              • Instruction Fuzzy Hash: 4A1193B0E143559BDB68DF65D884FEDBBB2BF44304F154529D801A7395DB708886CF90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 572226dee0cd7bbc3b869fce6f5d210771a8f7681741e53edc13df9efeb0cd60
                                              • Instruction ID: 2b3a341b2ae9d62f2c50adb07d9445fcdf4b3f0a48daa7f6b664ee732d885424
                                              • Opcode Fuzzy Hash: 572226dee0cd7bbc3b869fce6f5d210771a8f7681741e53edc13df9efeb0cd60
                                              • Instruction Fuzzy Hash: 6AF08271F002289F8B80EBB9590869F7AF99BC8261B014535D50AD3340EF38994587D1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e835c4928ed6ba4f340474202c0ac5a4e06d57eb1f2db11d3f24c8d8bf8f6bfd
                                              • Instruction ID: 8d55942c891135a5a354f65f0d6cda42c94b3e12f72cba031a3f4c51590ceca6
                                              • Opcode Fuzzy Hash: e835c4928ed6ba4f340474202c0ac5a4e06d57eb1f2db11d3f24c8d8bf8f6bfd
                                              • Instruction Fuzzy Hash: ABE03939B001288B8FC0E7B8D85889DB3F2AFC82117408064D51AE7358DF3498028BA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7d074e8c59a01306adcb79a8bf84b3c39502b7794aec6e495469085a208e7e78
                                              • Instruction ID: f6568da8f4dc315bb5516879f7561407244b941e968eddc639500416df93850a
                                              • Opcode Fuzzy Hash: 7d074e8c59a01306adcb79a8bf84b3c39502b7794aec6e495469085a208e7e78
                                              • Instruction Fuzzy Hash: B6F03A30E00209DFDB04DB90E5A5BEEBBB1AF88644F20801AE412A72A0CB741D05CFC1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 761f7f970ccab976a06857b8ca0115dc49b3dfe8cef5a5035ecb060b9d77bd4d
                                              • Instruction ID: aa6335f058418755d677428558ab4ff881e98bb46b876ae7a3af6b48a3211da5
                                              • Opcode Fuzzy Hash: 761f7f970ccab976a06857b8ca0115dc49b3dfe8cef5a5035ecb060b9d77bd4d
                                              • Instruction Fuzzy Hash: B7E0C2213453421BA780A079989173AB99ACBC1130B09C136AC0887A82D824C80893A5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000002.00000002.512593610.0000000006350000.00000040.00000800.00020000.00000000.sdmp, Offset: 06350000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_6350000_Proforma Inv.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d728d2a4eae8d9b31780f38dca05e609578ef77916091047d6608206d00819e1
                                              • Instruction ID: 1222d738c8e611bcdf96288e88294904530653180c22827b17c2caddac07e109
                                              • Opcode Fuzzy Hash: d728d2a4eae8d9b31780f38dca05e609578ef77916091047d6608206d00819e1
                                              • Instruction Fuzzy Hash: BFE08635B00118CFC744DB35ED48A6D77A7B7C82127158465D51BD3A00DE304C016790
                                              Uniqueness

                                              Uniqueness Score: -1.00%