Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Invoice.exe

Overview

General Information

Sample Name:Invoice.exe
Analysis ID:863303
MD5:5ccc83a775f796de3dd319752d32a509
SHA1:f564530c7f2e11f3320fac2a57e8abd33bd67126
SHA256:8a6bebf08f6c223ed9821ee3b80e420060c66770402687f5c98555f9b0cd02a3
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Contains functionality to capture screen (.Net source)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Machine Learning detection for sample
.NET source code contains potential unpacker
Yara detected Generic Downloader
Sample has a suspicious name (potential lure to open the executable)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • Invoice.exe (PID: 7148 cmdline: C:\Users\user\Desktop\Invoice.exe MD5: 5CCC83A775F796DE3DD319752D32A509)
    • RegAsm.exe (PID: 2380 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
    • 0xd3aa:$a1: get_encryptedPassword
    • 0xd73f:$a2: get_encryptedUsername
    • 0xd154:$a3: get_timePasswordChanged
    • 0xd25a:$a4: get_passwordField
    • 0xd3c0:$a5: set_encryptedPassword
    • 0xef90:$a7: get_logins
    • 0xec5e:$a8: GetOutlookPasswords
    • 0xe9a6:$a9: StartKeylogger
    • 0xeec7:$a10: KeyLoggerEventArgs
    • 0xe9b5:$a11: KeyLoggerEventArgsEventHandler
    00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x105792:$a1: get_encryptedPassword
      • 0x1197ae:$a1: get_encryptedPassword
      • 0x1ef3f2:$a1: get_encryptedPassword
      • 0x105b27:$a2: get_encryptedUsername
      • 0x119b43:$a2: get_encryptedUsername
      • 0x1ef787:$a2: get_encryptedUsername
      • 0x10553c:$a3: get_timePasswordChanged
      • 0x119558:$a3: get_timePasswordChanged
      • 0x1ef19c:$a3: get_timePasswordChanged
      • 0x105642:$a4: get_passwordField
      • 0x11965e:$a4: get_passwordField
      • 0x1ef2a2:$a4: get_passwordField
      • 0x1057a8:$a5: set_encryptedPassword
      • 0x1197c4:$a5: set_encryptedPassword
      • 0x1ef408:$a5: set_encryptedPassword
      • 0x107378:$a7: get_logins
      • 0x11b394:$a7: get_logins
      • 0x1f0fd8:$a7: get_logins
      • 0x107046:$a8: GetOutlookPasswords
      • 0x11b062:$a8: GetOutlookPasswords
      • 0x1f0ca6:$a8: GetOutlookPasswords
      Process Memory Space: Invoice.exe PID: 7148JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 4 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Invoice.exe.2f891e8.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.Invoice.exe.2f891e8.1.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
          • 0xc4d4:$s1: UnHook
          • 0xc4db:$s2: SetHook
          • 0xc4e3:$s3: CallNextHook
          • 0xc4f0:$s4: _hook
          0.2.Invoice.exe.2f891e8.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xb7aa:$a1: get_encryptedPassword
          • 0xbb3f:$a2: get_encryptedUsername
          • 0xb554:$a3: get_timePasswordChanged
          • 0xb65a:$a4: get_passwordField
          • 0xb7c0:$a5: set_encryptedPassword
          • 0xd390:$a7: get_logins
          • 0xd05e:$a8: GetOutlookPasswords
          • 0xcda6:$a9: StartKeylogger
          • 0xd2c7:$a10: KeyLoggerEventArgs
          • 0xcdb5:$a11: KeyLoggerEventArgsEventHandler
          1.2.RegAsm.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            1.2.RegAsm.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 14 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Invoice.exeReversingLabs: Detection: 21%
              Source: Invoice.exeVirustotal: Detection: 20%Perma Link
              Source: Invoice.exeJoe Sandbox ML: detected
              Source: Invoice.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Invoice.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: F:\Desktop V500\important\CSharp-RunPE-master\RunPE\obj\Debug\SeaCyanPul.pdb source: Invoice.exe, 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Invoice.exe, 00000000.00000002.259381177.00000000054E0000.00000004.08000000.00040000.00000000.sdmp
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 03034610h1_2_030341F8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 03033825h1_2_03032D38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 03033EC9h1_2_03033C08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0303E5E9h1_2_0303E330
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0303EE99h1_2_0303EBE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_03032258
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_03032A6D
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 03034610h1_2_030341E9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0303F2F1h1_2_0303F038
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h1_2_0303288B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0303FBA1h1_2_0303F8E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0303EA41h1_2_0303E787
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 03034610h1_2_0303453E
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0303F749h1_2_0303F48F

              Networking

              barindex
              Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Invoice.exe.2f891e8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Invoice.exe.2eabbb0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Invoice.exe.2ea857c.0.raw.unpack, type: UNPACKEDPE
              Source: Invoice.exe, 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: Invoice.exeString found in binary or memory: http://edstarcoordinator.com/api.asmx/GetSystems
              Source: Invoice.exe, 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 1.2.RegAsm.exe.400000.0.unpack, KrakenStub/KrakenSteak.cs.Net Code: TakeScreenshot
              Source: Invoice.exe, 00000000.00000002.256149307.00000000011DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: 0.2.Invoice.exe.2f891e8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.Invoice.exe.2f891e8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.Invoice.exe.2f891e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.Invoice.exe.2f891e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.Invoice.exe.2eabbb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.Invoice.exe.2eabbb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 0.2.Invoice.exe.2ea857c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 0.2.Invoice.exe.2ea857c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: Invoice.exe PID: 7148, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: RegAsm.exe PID: 2380, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: initial sampleStatic PE information: Filename: Invoice.exe
              Source: Invoice.exeStatic file information: Suspicious name
              Source: Invoice.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.Invoice.exe.2f891e8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.Invoice.exe.2f891e8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.Invoice.exe.2f891e8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.Invoice.exe.2f891e8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.Invoice.exe.2eabbb0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.Invoice.exe.2eabbb0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 0.2.Invoice.exe.2ea857c.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 0.2.Invoice.exe.2ea857c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: Invoice.exe PID: 7148, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: RegAsm.exe PID: 2380, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: C:\Users\user\Desktop\Invoice.exeCode function: 0_2_013550D00_2_013550D0
              Source: C:\Users\user\Desktop\Invoice.exeCode function: 0_2_0135F9B00_2_0135F9B0
              Source: C:\Users\user\Desktop\Invoice.exeCode function: 0_2_0135E5E80_2_0135E5E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303B2A91_2_0303B2A9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303A9C81_2_0303A9C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_030366B81_2_030366B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_03032D381_2_03032D38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_03033C081_2_03033C08
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303E3301_2_0303E330
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303EBE01_2_0303EBE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303ABE81_2_0303ABE8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_030322301_2_03032230
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303A2301_2_0303A230
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303A2401_2_0303A240
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_030322581_2_03032258
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303F0381_2_0303F038
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303F8E81_2_0303F8E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303E7871_2_0303E787
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303F48F1_2_0303F48F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_057E52601_2_057E5260
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_057EE2481_2_057EE248
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_057E7F601_2_057E7F60
              Source: Invoice.exe, 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSeaCyanPul.dll" vs Invoice.exe
              Source: Invoice.exe, 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKrakenStub.exe6 vs Invoice.exe
              Source: Invoice.exe, 00000000.00000003.246609960.000000000124D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDataBasePracticalJob.dllJ vs Invoice.exe
              Source: Invoice.exe, 00000000.00000002.259381177.00000000054E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSeaCyanPul.dll" vs Invoice.exe
              Source: Invoice.exe, 00000000.00000002.259017463.0000000005420000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDataBasePracticalJob.dllJ vs Invoice.exe
              Source: Invoice.exe, 00000000.00000000.245827312.0000000000ABE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRareCommodityHelper.exeH vs Invoice.exe
              Source: Invoice.exe, 00000000.00000002.258459348.0000000003EC4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDataBasePracticalJob.dllJ vs Invoice.exe
              Source: Invoice.exeBinary or memory string: OriginalFilenameRareCommodityHelper.exeH vs Invoice.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: Invoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: Invoice.exeReversingLabs: Detection: 21%
              Source: Invoice.exeVirustotal: Detection: 20%
              Source: Invoice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Invoice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Invoice.exe C:\Users\user\Desktop\Invoice.exe
              Source: C:\Users\user\Desktop\Invoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              Source: C:\Users\user\Desktop\Invoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Invoice.exe.logJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@0/0
              Source: Invoice.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\Invoice.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: Invoice.exe, RareCommodityHelper/MainForm.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 1.2.RegAsm.exe.400000.0.unpack, KrakenStub/KrakenDumpedList.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: 1.2.RegAsm.exe.400000.0.unpack, KrakenStub/KrakenSteak.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
              Source: C:\Users\user\Desktop\Invoice.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: Invoice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Invoice.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: F:\Desktop V500\important\CSharp-RunPE-master\RunPE\obj\Debug\SeaCyanPul.pdb source: Invoice.exe, 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Invoice.exe, 00000000.00000002.259381177.00000000054E0000.00000004.08000000.00040000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Invoice.exe, PathNode.cs.Net Code: ANTR3ND0 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: initial sampleStatic PE information: section name: .text entropy: 7.692787601373311
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exe TID: 2888Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0303A9C8 LdrInitializeThunk,1_2_0303A9C8
              Source: C:\Users\user\Desktop\Invoice.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: 1.2.RegAsm.exe.400000.0.unpack, KrakenStub/KrakenSteak.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll')
              Source: 1.2.RegAsm.exe.400000.0.unpack, KrakenStub/FFDecryptor.csReference to suspicious API methods: ('GetProcAddress', 'GetProcAddress@kernel32'), ('LoadLibrary', 'LoadLibrary@kernel32.dll')
              Source: C:\Users\user\Desktop\Invoice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeQueries volume information: C:\Users\user\Desktop\Invoice.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Invoice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2380, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: Yara matchFile source: 0.2.Invoice.exe.2f891e8.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Invoice.exe.2f891e8.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Invoice.exe.2eabbb0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Invoice.exe.2ea857c.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Invoice.exe PID: 7148, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2380, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2380, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              1
              Masquerading
              2
              OS Credential Dumping
              1
              Process Discovery
              Remote Services1
              Screen Capture
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Disable or Modify Tools
              1
              Input Capture
              21
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Email Collection
              Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
              Virtualization/Sandbox Evasion
              Security Account Manager13
              System Information Discovery
              SMB/Windows Admin Shares1
              Input Capture
              Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
              Process Injection
              NTDSSystem Network Configuration DiscoveryDistributed Component Object Model11
              Archive Collected Data
              Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA SecretsRemote System DiscoverySSH2
              Data from Local System
              Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common2
              Obfuscated Files or Information
              Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items12
              Software Packing
              DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Invoice.exe22%ReversingLabsWin32.Trojan.Pwsx
              Invoice.exe20%VirustotalBrowse
              Invoice.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://edstarcoordinator.com/api.asmx/GetSystems0%Avira URL Cloudsafe
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              https://api.telegram.org/botInvoice.exe, 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                high
                http://checkip.dyndns.org/qInvoice.exe, 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://edstarcoordinator.com/api.asmx/GetSystemsInvoice.exefalse
                • Avira URL Cloud: safe
                unknown
                No contacted IP infos
                Joe Sandbox Version:37.1.0 Beryl
                Analysis ID:863303
                Start date and time:2023-05-10 20:49:15 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 0s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:13
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample file name:Invoice.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@3/1@0/0
                EGA Information:
                • Successful, ratio: 50%
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 110
                • Number of non-executed functions: 10
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): fs.microsoft.com
                • Execution Graph export aborted for target Invoice.exe, PID 7148 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\Invoice.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):886
                Entropy (8bit):5.325593152230861
                Encrypted:false
                SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhgLE4qE4j:MgvjHK5HKXE1qHiYHKhQnogLHqHj
                MD5:AC2CBF71E733CA2B84323E871BD62FDD
                SHA1:6B351F2F58892315B9D344A58451C6390DD108DE
                SHA-256:7439A0D64BAF07FC16F8F3026113B49A1F095C1398837AFD89EF8F21BF3CCBC8
                SHA-512:7D4633EFECEFCA05CB911FAD832C249A80F7C72A5041943D6D4B409DDB3DEE93CD3A9791D44092711FFF305A54A70AF4B2045B7515774A06E6B86EE49F67287F
                Malicious:true
                Reputation:low
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"Microsoft.CSharp, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Dynamic, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.666683658861415
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                • Win32 Executable (generic) a (10002005/4) 49.75%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Windows Screen Saver (13104/52) 0.07%
                • Generic Win/DOS Executable (2004/3) 0.01%
                File name:Invoice.exe
                File size:240640
                MD5:5ccc83a775f796de3dd319752d32a509
                SHA1:f564530c7f2e11f3320fac2a57e8abd33bd67126
                SHA256:8a6bebf08f6c223ed9821ee3b80e420060c66770402687f5c98555f9b0cd02a3
                SHA512:8c44dc190c9201edaae3075ece5625b23035c0313b5c6715b2620f1d59f721b3b02402dfa22515e949b7f174496c66b2b7060291f5cb8d01ad9339a51dbaf089
                SSDEEP:6144:T1XQakQ0JFxbIBMPYVmmF2qHyodW5hdn3dXmjMAajj13mauq:ZXQaQbO8d33dcMAA
                TLSH:C634D00533FC4441F6FA5F7F68B091E00B727E0B5A75E68E4D8A64CD28E27124993B27
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2.Zd..............0.................. ........@.. ....................... ............`................................
                Icon Hash:00828e8e8686b000
                Entrypoint:0x43c1ae
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x645AD232 [Tue May 9 23:07:30 2023 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x3c1600x4b.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3e0000x5f6.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x3a1b40x3a200False0.7659442204301076data7.692787601373311IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x3e0000x5f60x600False0.423828125data4.196950651817995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x400000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_VERSION0x3e0a00x36cdata
                RT_MANIFEST0x3e40c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                DLLImport
                mscoree.dll_CorExeMain
                No network behavior found

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:20:50:14
                Start date:10/05/2023
                Path:C:\Users\user\Desktop\Invoice.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\Invoice.exe
                Imagebase:0xa80000
                File size:240640 bytes
                MD5 hash:5CCC83A775F796DE3DD319752D32A509
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.256900468.0000000002E91000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:1
                Start time:20:50:18
                Start date:10/05/2023
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Imagebase:0xf40000
                File size:64616 bytes
                MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.512262420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                Reputation:high

                Reset < >
                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1f8840cb89007693344bf8ffd3476a804e61d280e17893b364e55a508e17e587
                  • Instruction ID: 9442942c5e011359a2f3fca066a12c0c2c0534e2a7ea03f47e3c388f574b18b9
                  • Opcode Fuzzy Hash: 1f8840cb89007693344bf8ffd3476a804e61d280e17893b364e55a508e17e587
                  • Instruction Fuzzy Hash: 6DF16D30A002499FDB48DFA8C494AAEBBF6FF88304F148569E81AAB355DB31DC45CB51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 44eaa2a8d6def172e8f647e5882626984780a0011c80c3161bdad4b78e724af8
                  • Instruction ID: 1bbd3e1e4a4516323677fb99b4dbc21651f2ad41d808428069d27a1f6b2ed469
                  • Opcode Fuzzy Hash: 44eaa2a8d6def172e8f647e5882626984780a0011c80c3161bdad4b78e724af8
                  • Instruction Fuzzy Hash: 58819630B082189FCB5CAB74946467E7BB7BFC8700F14881EE446E7389DE3998068B91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID: d
                  • API String ID: 0-2564639436
                  • Opcode ID: 2ab33c721775b3d5f6e05e38d36c06ea402086303f73628cdd2facc917e21c39
                  • Instruction ID: 27db4f5895dfea6048a289a6298846bc3780c63ca2345279410c2811c9e65999
                  • Opcode Fuzzy Hash: 2ab33c721775b3d5f6e05e38d36c06ea402086303f73628cdd2facc917e21c39
                  • Instruction Fuzzy Hash: A7616A34A00A0A8FCB15CF59C4C08AAFBB6FF88314714856AD9199B62ADB30F951CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5d64bc97ba7216cf879c92c776a259aedcd11c77d5f62af4b58e4744573405c5
                  • Instruction ID: faceda6322a3a260c634d5284a92d1a8007b05f3ec3b4e4ac481745869e7ea0d
                  • Opcode Fuzzy Hash: 5d64bc97ba7216cf879c92c776a259aedcd11c77d5f62af4b58e4744573405c5
                  • Instruction Fuzzy Hash: 60E23934A4021D9FDB25AF60D860BEDBB36FF89341F40459AEA0A2B385DB315D85DF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID: #
                  • API String ID: 0-1885708031
                  • Opcode ID: 272dda2f7728387f1228dfc323edcfe2eecd0c8322057edd17e4d35eabfeaa07
                  • Instruction ID: ea45e15920792f4daab408d05c8b0708600e4b55110c9ebaf96c0579c1f80d81
                  • Opcode Fuzzy Hash: 272dda2f7728387f1228dfc323edcfe2eecd0c8322057edd17e4d35eabfeaa07
                  • Instruction Fuzzy Hash: 7F1162330083C14FC7468FA8A8A25C17F71EE53A6930909E7CA89CB113C328881FDB96
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1779147767b31ef92865615fb74e9b944ca65aa34d41e99b530a260b57bfdbba
                  • Instruction ID: ce783b342673f02ca6808e9263c3432b3efef949197168e304f6eece911c4d01
                  • Opcode Fuzzy Hash: 1779147767b31ef92865615fb74e9b944ca65aa34d41e99b530a260b57bfdbba
                  • Instruction Fuzzy Hash: C9E12530B04309CFDBA68BAD8450D6A3BEAEF85A1C715506ADD0BEB352DE28CC01C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8cfa7552837f8b41749a6cb9c490a27f9532cdf1e53c8b7d652b7b0e00598849
                  • Instruction ID: d169f4fd2c00f9e16e45249a100e0f9fba95cfd18dc922345019d9b3f77e39d7
                  • Opcode Fuzzy Hash: 8cfa7552837f8b41749a6cb9c490a27f9532cdf1e53c8b7d652b7b0e00598849
                  • Instruction Fuzzy Hash: 38F19D70B00346CFDB64CFA9C484AAABBF5EF48708F148929E946DB751DB34E845CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cbacd672bb40797cacd0b21930bc8a154f21441f48920581be45221ab52073ef
                  • Instruction ID: 3c562cd2845c367bab2f8e2b0186e6060f053739c8cfcf8fd81ce764ea09e412
                  • Opcode Fuzzy Hash: cbacd672bb40797cacd0b21930bc8a154f21441f48920581be45221ab52073ef
                  • Instruction Fuzzy Hash: 3DA13471A003058FC704AB78D4B99EC7FBAFF91254745996AE90AEF251EF309C0987D0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e8e3760f65ea8fa331fe37b3ef00173749670cb4aef0b95b62b9521cc1bcfbe5
                  • Instruction ID: 90ef767d8628eca1cee5263f226406cb37e4dbcf29154c504b8f4af151c628b2
                  • Opcode Fuzzy Hash: e8e3760f65ea8fa331fe37b3ef00173749670cb4aef0b95b62b9521cc1bcfbe5
                  • Instruction Fuzzy Hash: EAA11271A003058FC704AB78D4B99EDBFBAFF91254745996AE90AEF251EF30AC0587D0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 17293d5176f0336e75d736d7396e83c01dbd323349a05a4e43d7ea70882f27cc
                  • Instruction ID: ee822c253fc5a6921233c9449830d988393f564a96a8d2c8f7ea27a94620b9a8
                  • Opcode Fuzzy Hash: 17293d5176f0336e75d736d7396e83c01dbd323349a05a4e43d7ea70882f27cc
                  • Instruction Fuzzy Hash: 3D9186307102154BFB581A7E8854BFAFAAAAFD5B49B14403EED06CB392DF35CA41C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a8f707a3d2beba2ba1f4ddbd1337f9d84ad88cbecad9d3f03273242ed531a198
                  • Instruction ID: eae09c1e79c7bc2a4efe4a143dd6e9755cca6fa34b53e15fd87b4a28bb550102
                  • Opcode Fuzzy Hash: a8f707a3d2beba2ba1f4ddbd1337f9d84ad88cbecad9d3f03273242ed531a198
                  • Instruction Fuzzy Hash: 1181A234B00209CFEBA69B7D8150D397FE6AF85A08B1542AADD06DB361EE34CC41EB51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 27568a65b50519807856d06625719426cd81a41d71a353c95e7fb3d0007ae8de
                  • Instruction ID: feb3ed44bd89fb83925bb5885a47b76f3ec60f252d066c6cb291500c49c809b4
                  • Opcode Fuzzy Hash: 27568a65b50519807856d06625719426cd81a41d71a353c95e7fb3d0007ae8de
                  • Instruction Fuzzy Hash: 51A13C346007469FC704DF28C4A4999BBB2FF993107518EA9E44A8B772DB30FC4ACB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ba2abbc08e549c3d2c3ca12879c5ad352210bd4955e05e43978efac59bf4bd84
                  • Instruction ID: 002ea4ac562c6e6fc1d0c114815f7e418485b67d2646d0b6ee60c8b9291bbda6
                  • Opcode Fuzzy Hash: ba2abbc08e549c3d2c3ca12879c5ad352210bd4955e05e43978efac59bf4bd84
                  • Instruction Fuzzy Hash: 74A12C346007469FC744DF28C4A499ABBB2FF993107558E69E54A8B772DB30FC4ACB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25d6c4efacf9f78a12506ffae11e4eb90463872eb9066bd8dac9120551b8d33f
                  • Instruction ID: 7a0f00da3e964eb533115e58ee2555c94a7710982b9981af9ef5cc342127bc2f
                  • Opcode Fuzzy Hash: 25d6c4efacf9f78a12506ffae11e4eb90463872eb9066bd8dac9120551b8d33f
                  • Instruction Fuzzy Hash: D5619C3560024A8FCB04DF58C4949AEFBB6FF85314B14CA69D9499B212DB31FC46CBE0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0be59e9a50506ab21558f116a162dc59ac2973b06367719849326ecd6be091de
                  • Instruction ID: ac7facb719c6b0c9e97a79034ff221393dbb027c171fa74f2d57ea37a1304ed2
                  • Opcode Fuzzy Hash: 0be59e9a50506ab21558f116a162dc59ac2973b06367719849326ecd6be091de
                  • Instruction Fuzzy Hash: 10717E74E002188FCB44DFA9D99499DBBF2FF89310F20916AE919AB365DB31AC45CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 85fe43568da345104674e44532de89b1d20230b3088b33379d08df7a25268303
                  • Instruction ID: 0fa8a42a94d7ef33f524165e11fc8b1f4ee660c0ad7d33701ad53d8f8fee4ca6
                  • Opcode Fuzzy Hash: 85fe43568da345104674e44532de89b1d20230b3088b33379d08df7a25268303
                  • Instruction Fuzzy Hash: 1B717F74E002188FCB44DFA9D99499DBBF2FF89310F208169E919AB365DB31AC45CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f0baba7a3ed84fbea83eed64e9cb8491aeb57939541db139cdbc22d77d62dd05
                  • Instruction ID: a54473caef2e32ee7c5d5aa904af412ad228515ce32003682686d0bb3a746b19
                  • Opcode Fuzzy Hash: f0baba7a3ed84fbea83eed64e9cb8491aeb57939541db139cdbc22d77d62dd05
                  • Instruction Fuzzy Hash: D051C2352103029FD714EB34C4A56AABBB7FF943007548E2AE54A8B656DF70EC0ACBD0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1ab0fb9f794ff3d19eddd688956718e8598c898843ed739d31107a6ed0126fb4
                  • Instruction ID: a7406d191a4df3f8e9815a137b5361bafebbdac805ca1b213198633b72e7a0c4
                  • Opcode Fuzzy Hash: 1ab0fb9f794ff3d19eddd688956718e8598c898843ed739d31107a6ed0126fb4
                  • Instruction Fuzzy Hash: 0C51B574E10218DFCB09DFA9D8959DDBBB6FF89300F10812AE805AB364DB356942CF44
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 37eb632002f41b6b0be06ceccc1765f6efd2c5268892f447c13e481b7ff4ad9d
                  • Instruction ID: 545799af732b4218dffcc4f5c37f61c4f116863acef0d2cee1a645c55708b452
                  • Opcode Fuzzy Hash: 37eb632002f41b6b0be06ceccc1765f6efd2c5268892f447c13e481b7ff4ad9d
                  • Instruction Fuzzy Hash: 814182702007415FE355EF78C4B5A99BBB2AF91310B84CE69D18A8F552DB70A84D8BD1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 61c8ab7943e368ff5f798f80b80aa4dda748ff697f7688c51d1d361fc1033f29
                  • Instruction ID: 7ef8b6897603391c05f382f6f442b25470c3840582708f97038f360efdf97301
                  • Opcode Fuzzy Hash: 61c8ab7943e368ff5f798f80b80aa4dda748ff697f7688c51d1d361fc1033f29
                  • Instruction Fuzzy Hash: F2416A70E0021A8FCB44CFA8C9849EEBBB2FF89314F558555D905EB356DB34E942CBA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9fa270220c1b5ee0cff81c870f3e6a8a953c4e5a8e205ae1ba6638344ac588ee
                  • Instruction ID: fdf50b71dd48af16b35a8af6b0894a842f8db87c019ce2b29bbc55799e74cb5b
                  • Opcode Fuzzy Hash: 9fa270220c1b5ee0cff81c870f3e6a8a953c4e5a8e205ae1ba6638344ac588ee
                  • Instruction Fuzzy Hash: A04142352103029FD314EB34D4A96AABBB7FBD4300B548E2DE54A8B655DF71EC0A8BD4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cdf901a4f4b5757cbc3aef2e64803babdcb741d0691a6d588ba4292bed79a639
                  • Instruction ID: 3ce132d9dd2b45b3a4e6e5679c139d54f0613d249f434de514f7ea5400e5353f
                  • Opcode Fuzzy Hash: cdf901a4f4b5757cbc3aef2e64803babdcb741d0691a6d588ba4292bed79a639
                  • Instruction Fuzzy Hash: AF4151302007415FE354EF69C4A4A99BBB6AF91320B94CE6DD18A4F562DB71B8488BD1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 13bddc36534517d64f66a2f826756c4a3d3da1a77643d0bfdfb816b059eebbca
                  • Instruction ID: beaa42263556d5b53d4a0e0ec55b5cd8f78f76098e3820bb9b01ac8e59350405
                  • Opcode Fuzzy Hash: 13bddc36534517d64f66a2f826756c4a3d3da1a77643d0bfdfb816b059eebbca
                  • Instruction Fuzzy Hash: 6E31D632B00620DFC765CB6DC98496ABBE6EF84A5571A8679EC49DB742DB30EC0187D0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 22d7c8f63811e4411cc105d916ee88bcd16cc8d55c0b48ab2e23c56c8a3dca22
                  • Instruction ID: 1da6e57e08220163c0da32cf91f65812ae4f362ce4075762e7f34b68633e89c3
                  • Opcode Fuzzy Hash: 22d7c8f63811e4411cc105d916ee88bcd16cc8d55c0b48ab2e23c56c8a3dca22
                  • Instruction Fuzzy Hash: 18417274E012099FCB44DFA9D595AEEBBF2FF89300F109169E905A7360DB31A905CF54
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ca3f7a259e662099e6bd1d94cc76e2de14498b70bae6269b7e2c5fcce3a4e914
                  • Instruction ID: 6c8735a7215b3f2e8b40edccc9b214b5da04d8b61f0787b4f17defff7331137b
                  • Opcode Fuzzy Hash: ca3f7a259e662099e6bd1d94cc76e2de14498b70bae6269b7e2c5fcce3a4e914
                  • Instruction Fuzzy Hash: 3B4191B5E002099FCB44DFA9D594ADEBBF2FF89301F209169E905A7360DB31A905CF54
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cceab914da51ddac79d718fdb189e28e7ee50e20e847eddc5e095c64afed1de3
                  • Instruction ID: 052341500794bcf1572863462b244b269185164c037267df0852c4074842cda3
                  • Opcode Fuzzy Hash: cceab914da51ddac79d718fdb189e28e7ee50e20e847eddc5e095c64afed1de3
                  • Instruction Fuzzy Hash: 532178B0900256CBCB6D9B6DD580D7EBBB5AB41A4CB050D26ED1597A51FB30EC80C390
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d56899e421182dd284f910c00adfcb93a69cf0b5a40a5d011dd11d062b8118b0
                  • Instruction ID: b06149aaea7e8e530b28b0b95f3b957d940f02b8c16ed4f2c20b0c4acf4a389d
                  • Opcode Fuzzy Hash: d56899e421182dd284f910c00adfcb93a69cf0b5a40a5d011dd11d062b8118b0
                  • Instruction Fuzzy Hash: B0416074E012099FCB48DFA9D5949AEBBF2BF89300F209169E915A7360DB31A905CF54
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9cae07b2af8454bea98e37b21748cc9727bb8395984b8b8cce4c9d672ead6c2f
                  • Instruction ID: 7d0782474375ab08d61d7addb75a9722a08d80e0233559ebea95ed53ad2ac8da
                  • Opcode Fuzzy Hash: 9cae07b2af8454bea98e37b21748cc9727bb8395984b8b8cce4c9d672ead6c2f
                  • Instruction Fuzzy Hash: AB418F74E002099FCB44DFA9D59499EBBF2FF89200F209169E905AB360DB31A905CF64
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fba6bd44bf448dd593c5ff314ccc0eb2de1bb27260784243991c2a11f075e747
                  • Instruction ID: 82126859f4a435e5d736c8fd831a164d6d0a8c0dc080e997cf4260bf5866de78
                  • Opcode Fuzzy Hash: fba6bd44bf448dd593c5ff314ccc0eb2de1bb27260784243991c2a11f075e747
                  • Instruction Fuzzy Hash: 9E218EF26043854FD702DE28D8A6BD93B72EFA6254B44092ED445CB243EA64C50AC791
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5bbf85e5654632bc8fa195039bc515953eba9342782def79efb775409ab2158d
                  • Instruction ID: fc19e22d1a0f2b60cc3bfad58e4a3520b5f7d4c14987bb5d8a437d723d0de3ee
                  • Opcode Fuzzy Hash: 5bbf85e5654632bc8fa195039bc515953eba9342782def79efb775409ab2158d
                  • Instruction Fuzzy Hash: 172165343013421FF708AB7598757BE2A67EBE1220F998D39E546CF295DE71AC0A47D0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 83995ea3037c96d097c6e824c37defa67f4ada72bd546dbe0b2909198adf4449
                  • Instruction ID: 35eaf92a6187d61e6af2fcf011ae437726581173079b120282fa1251132f37d4
                  • Opcode Fuzzy Hash: 83995ea3037c96d097c6e824c37defa67f4ada72bd546dbe0b2909198adf4449
                  • Instruction Fuzzy Hash: 9621D1766006269FC711CF6CC9809AAFBB5FF486643158B26E899DBA02D730FC45CBD0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 53d5abbbb0541f2b0c11fdd51925834b89507731ee759573f57e99e2da690c91
                  • Instruction ID: 222374f07be6d74e7ead8803eddcf7cef3435b5c76b6117f380ca309bdfc21cf
                  • Opcode Fuzzy Hash: 53d5abbbb0541f2b0c11fdd51925834b89507731ee759573f57e99e2da690c91
                  • Instruction Fuzzy Hash: 102165343013061BF708AB7598757BE6677FBE0220F898D38EA468F285DE71AC0A47D0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.259332256.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_54d0000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3ecfe9c1537215ff397e9826f3e185c63faa2e5e3a0d38fd6a28e4d2b0be6cef
                  • Instruction ID: a86f95fdf3d7b0a78ea2b32887eff45b07865731ca332d579e8ef6ccec63eeb9
                  • Opcode Fuzzy Hash: 3ecfe9c1537215ff397e9826f3e185c63faa2e5e3a0d38fd6a28e4d2b0be6cef
                  • Instruction Fuzzy Hash: 9411D231304205ABCB259A6AA4645BBF797EFC5261F28806FD94EC7350FE36C842C361
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.259332256.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_54d0000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5c2d0ecef4162f7dc32725cab7e496b83a1511dc69bfbe9d8b082c3be93dfd37
                  • Instruction ID: 353b9dbe405cd92103863e59057dbc6532cce72ca4e1a4ffe95a7c363b43254c
                  • Opcode Fuzzy Hash: 5c2d0ecef4162f7dc32725cab7e496b83a1511dc69bfbe9d8b082c3be93dfd37
                  • Instruction Fuzzy Hash: 3E21BE2610E3C4AFC713463198686A67F72AF83290B1E01C7D889CB2A3F5288D48C772
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dec0c90af3b1f46fd465a99373c2a1ee29bcf6883e3736b7de1451723946155b
                  • Instruction ID: cfedcd856b9965d735a130a0dc2196618f25f15ff98269d5881aef25e05d4456
                  • Opcode Fuzzy Hash: dec0c90af3b1f46fd465a99373c2a1ee29bcf6883e3736b7de1451723946155b
                  • Instruction Fuzzy Hash: DA210731704290CFCB07DB1DD8D9A597F62EF92614B4944AACEC58F247CA30D847C796
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 802438e07961670080d8ad35cbba7d3940439a77792020848d210a72faec3d56
                  • Instruction ID: 8d7dde072d3737e18916735537a80d5788b13424c943571f241e788ed9b20389
                  • Opcode Fuzzy Hash: 802438e07961670080d8ad35cbba7d3940439a77792020848d210a72faec3d56
                  • Instruction Fuzzy Hash: C91136B12047854FC3029F68D8B1ADA7BB2EFD5304F44496AD4498F292EE74980A87E1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 68b60e3a3c0e066dcd4100034708d6e774d4b83db9a86e1768b9c4192725fd67
                  • Instruction ID: 949802f6350e536befc662661d220d97bac6364ff37144be281786c17560ec71
                  • Opcode Fuzzy Hash: 68b60e3a3c0e066dcd4100034708d6e774d4b83db9a86e1768b9c4192725fd67
                  • Instruction Fuzzy Hash: 1611C6323152148BEB185B7EB4446AABFABEFC066A314407BF60ACB341CF35C846C791
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6f5faebb82e385da850a712c8f9ad5064009ea156538de1d763f7bb30bbdb0bb
                  • Instruction ID: 71a84fe784c48e8079b814129ed29a29926df135038591593284607714db7f3f
                  • Opcode Fuzzy Hash: 6f5faebb82e385da850a712c8f9ad5064009ea156538de1d763f7bb30bbdb0bb
                  • Instruction Fuzzy Hash: 70218031A00248AFDF15CFE4D845F9EBBB9FF48710F04806AE911AB356DA31D855CB40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 05095438d531452b3e8e51177fd6c5a1e87743f4b9ca29b20e24459c02da5e52
                  • Instruction ID: 7fe82d4c66d76ae24bd0a39bd8eb2a57a82a847faf22a797a51340eff376daa4
                  • Opcode Fuzzy Hash: 05095438d531452b3e8e51177fd6c5a1e87743f4b9ca29b20e24459c02da5e52
                  • Instruction Fuzzy Hash: 2421F675E00209DFCB08DFA5D945AEEBBB6FB88300F208069D805A7354DB359945DF54
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 059b2fa959d87ecdf2d56f071953c29a84e4fbf086cb4a42c502d7d9afb335c0
                  • Instruction ID: beabc46cc2448ec335f97fc39dfaa83a2a591fc0e84f39d727cdae5ff3ed53ee
                  • Opcode Fuzzy Hash: 059b2fa959d87ecdf2d56f071953c29a84e4fbf086cb4a42c502d7d9afb335c0
                  • Instruction Fuzzy Hash: 7421F838A14218CFDB49DFA9D485AECBBF5FB49314F14816AEC09A7356CB31A806CF40
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7bcd6c3c8ea4f6ab007b2be2b8157cc003982ec2897c3f229e97fabf7795348f
                  • Instruction ID: 42ee80d99996aa9f4ef32b5d893d8086009bc8a3b82472a468988321fb7d0e4d
                  • Opcode Fuzzy Hash: 7bcd6c3c8ea4f6ab007b2be2b8157cc003982ec2897c3f229e97fabf7795348f
                  • Instruction Fuzzy Hash: 7811E2317017009FE7268FAAD480D53BFB6EF85728B1485AAEA4A8B313C731E885C750
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 78752a5d95f49bc11f6399b0832ec1ab47205d9085483041dc1c620f5b9e979f
                  • Instruction ID: a0e3ca1d1e7d2c0fd94d52f5de46e8bfc7fb1d55a6c9b8bc11c0acd23d882940
                  • Opcode Fuzzy Hash: 78752a5d95f49bc11f6399b0832ec1ab47205d9085483041dc1c620f5b9e979f
                  • Instruction Fuzzy Hash: AA112532384244BFD3119775EC56F967FA9EB46720F24406AF249DB3D6C969AC02C394
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c46bb6f2e6254e20631ccc7a664c636cb36abf5cbc68fc83f3738fa53e9aef78
                  • Instruction ID: 2c0399901d0fef248699cfa642e4cca38b989cde1cc42ae13516ce5237432eca
                  • Opcode Fuzzy Hash: c46bb6f2e6254e20631ccc7a664c636cb36abf5cbc68fc83f3738fa53e9aef78
                  • Instruction Fuzzy Hash: BC11BB742007028FCB19DF6CD4A492ABBB1FFC4214B008A69D9469B302DB74DD05CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 90f4b541dae96aa9066af5bbe8005c0c2f38caf93bbe8e5d4fe1beeb385eff64
                  • Instruction ID: c47da4c327d44b2499db9d1498fa9c3e1244073e7d56060c42b412c6255e6b78
                  • Opcode Fuzzy Hash: 90f4b541dae96aa9066af5bbe8005c0c2f38caf93bbe8e5d4fe1beeb385eff64
                  • Instruction Fuzzy Hash: 3D119D31A09250CFC752CB58C994F9ABFF5EF85624B1988AAD8899B213C630EC00CB90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9de535cf6808d08a1e54b062f6e8bb3fa354e277445e6057a4d9267f9d0613b9
                  • Instruction ID: 6cdaeb8ccf387896d58229590b5fcb3c4c6505aad4e02ff74eada7c51662a7f7
                  • Opcode Fuzzy Hash: 9de535cf6808d08a1e54b062f6e8bb3fa354e277445e6057a4d9267f9d0613b9
                  • Instruction Fuzzy Hash: 4121E378E00209CFCB08DFA6D9559EEBBB6FF88300F208068D805A7354DB35A945CFA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 98e29005bd4461ca787f95e2d6a7e50980a410790fd7a81782b76c463d87c083
                  • Instruction ID: f70b165250bba378b9fc69849db40b5906b40f9b5fded19eeb5b9d0d5eec732c
                  • Opcode Fuzzy Hash: 98e29005bd4461ca787f95e2d6a7e50980a410790fd7a81782b76c463d87c083
                  • Instruction Fuzzy Hash: F1217F31A04605CFCF19DF59C8C48AEFBB6FF843147148566E909DB26ADB70E914CBA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e27d029c7f40bcf0ad2ccf674750d57551de6085b4d47c98685dd90e1d1d0a37
                  • Instruction ID: ead33e842919145e5de9d60221091a50f6b9897089f2f9d2ec3c7071dcbcc2f7
                  • Opcode Fuzzy Hash: e27d029c7f40bcf0ad2ccf674750d57551de6085b4d47c98685dd90e1d1d0a37
                  • Instruction Fuzzy Hash: 3501F5303052155BFB6416AF8444BBBAEEE9FC4B55F44403BAE0AC7781DE65CC81C362
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 157a695611c948815e7ac7e6367e146b9f6ae7ceae6ab078fe802fc77cf973b5
                  • Instruction ID: f5de2b12e273d8574b3be4a17bcc039aebb78011bc92433f3c4bd45c71708c5a
                  • Opcode Fuzzy Hash: 157a695611c948815e7ac7e6367e146b9f6ae7ceae6ab078fe802fc77cf973b5
                  • Instruction Fuzzy Hash: 9A110270A04205CBDB25DF78D4296ECBBF2BF88301F288529E882B7259CB365849CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 01bec2094ef4e54941816daee99cef61e3b747dffa8061d7b8e158b643c284e5
                  • Instruction ID: 10dc1585ca3c9c1c63319b9c586d760cbf0d85fe42949a2981b1c503ef5304db
                  • Opcode Fuzzy Hash: 01bec2094ef4e54941816daee99cef61e3b747dffa8061d7b8e158b643c284e5
                  • Instruction Fuzzy Hash: 75118C742007168BCB68DB6CD4A0D5EBBB5FFD4624B008A29E9069B301DB75EC018B90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fa79640598909e2056e3e31e27870bb6396fba753e93e9cb7c67a1629581d745
                  • Instruction ID: 60216f225a05c7506cdb241dba42c265aa8bfbabc29689772899a8144f7a5768
                  • Opcode Fuzzy Hash: fa79640598909e2056e3e31e27870bb6396fba753e93e9cb7c67a1629581d745
                  • Instruction Fuzzy Hash: 5A11E9703002094BD714EF6DD861A9E77A7EFC8354F908939E8458B650DE70AC0587E1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7526abbf91772a25a47867f7e675860357da42783675d9860a2533023415b44d
                  • Instruction ID: 5b09b0a7e5f875835273633ecbb2a2e9b04584e9609b6e792240e7e82d91406d
                  • Opcode Fuzzy Hash: 7526abbf91772a25a47867f7e675860357da42783675d9860a2533023415b44d
                  • Instruction Fuzzy Hash: 1E11C031344208AFD310DB2AEC59F567FAAEF85B10F5540A6E209DF3E6CA65AC018794
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ada27348a9e5ad19312cad22e9aefad015b7999086c9aaf6fd649fc1b3d29715
                  • Instruction ID: dd34c01a88f50a4d5f358565b0829f61c7f04c82c98f67eee0e5199615932efa
                  • Opcode Fuzzy Hash: ada27348a9e5ad19312cad22e9aefad015b7999086c9aaf6fd649fc1b3d29715
                  • Instruction Fuzzy Hash: 78115E342007465FC714EB28D46489ABFB6EFD12143148E6ED49A8B262DF71AD0F8BD4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d26fd84f9339c1414f1bac5e00252523c57395fa064ab8f7daef34e35ac3050f
                  • Instruction ID: 397b7adce7304d8e81fc0d750c4dafe6ac19774b6785a18be306e4e02e0f5e40
                  • Opcode Fuzzy Hash: d26fd84f9339c1414f1bac5e00252523c57395fa064ab8f7daef34e35ac3050f
                  • Instruction Fuzzy Hash: 5711EF70A04209CBDB24DF69D459AEDBBF2BF88700F24C129E842B7259DF324849CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2d8fb56290b754a5091506d6174358f0f0b4cadf00b600acd07f276730d2f102
                  • Instruction ID: 66d35aa0a2415b9c83cb1d75c8750f9587040e3a99d896ef47149657e4b4e2ed
                  • Opcode Fuzzy Hash: 2d8fb56290b754a5091506d6174358f0f0b4cadf00b600acd07f276730d2f102
                  • Instruction Fuzzy Hash: 8E21513491124ADFCB48EFA9E555AEE7FB1FB48300F008A66E50193359DB342A46CFD0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3b9448c435ca0803daa6abe278f5561373c2d8701701f8d62fbc582cd37424c1
                  • Instruction ID: 98eda39e6c276d0ea53fda705568b707d9d7748b732edd181db3a25bfadbea51
                  • Opcode Fuzzy Hash: 3b9448c435ca0803daa6abe278f5561373c2d8701701f8d62fbc582cd37424c1
                  • Instruction Fuzzy Hash: BE115E302007469BC714DF28D4A489ABBB6FFD13143148E2DD55A8B661DF72AC0B8BD4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 09e581cd6796e82e3548f1ad7362f4c0a11bd677308c79879ff818a8c3720e7f
                  • Instruction ID: 142b18976bdcee87e683b4ea5dcef1e06359015570059bb7227a7b4cdedd3aa4
                  • Opcode Fuzzy Hash: 09e581cd6796e82e3548f1ad7362f4c0a11bd677308c79879ff818a8c3720e7f
                  • Instruction Fuzzy Hash: 9401A2B47003146FD3189A7E9454B56BAEEEFC9660B50812EFA0DCB381EE71DC46C3A4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2114f511383b96ba767ce05fc56bdf4417d52ecd0edb084b1fb35f47f17f14b8
                  • Instruction ID: 5fd10f92e5138c573e873c495445456c386184ba8ad02220ca406033c6d71e70
                  • Opcode Fuzzy Hash: 2114f511383b96ba767ce05fc56bdf4417d52ecd0edb084b1fb35f47f17f14b8
                  • Instruction Fuzzy Hash: B511123491125EDFCB48EF6AE4559AEBBB1FB88300F008A26E50593359DF306A46CFD0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8f0ca92e3b79d3af802a7584849b207fcd9a83fb986a0785c9f2b5d4820dbcae
                  • Instruction ID: fd1f08ea6e068ad1f6c70bc60adf6bec3a6c0279ebb17cb26da655af662717cf
                  • Opcode Fuzzy Hash: 8f0ca92e3b79d3af802a7584849b207fcd9a83fb986a0785c9f2b5d4820dbcae
                  • Instruction Fuzzy Hash: CDF02877B093522BF712055A4C50EBF7FABDFC5660F0A8066FE4587182CA26CC12E3A1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2eb292b63d1b3275683b13a7bc33d855c292c3537f238bd3ecd6c1d92c77d85b
                  • Instruction ID: 9f2054126f285a051c6b0f2ae8286f9c33ce23b65a84ad6864dc9bfca52feb48
                  • Opcode Fuzzy Hash: 2eb292b63d1b3275683b13a7bc33d855c292c3537f238bd3ecd6c1d92c77d85b
                  • Instruction Fuzzy Hash: E2F0E977B0022667F715044B9C54FBF6EABDBC4AA1F0A4036FF0583240CA36DD51A3A0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8123377beed462e6961661804facbf7253ff77a4f37dd01311f62fdf20d6cf68
                  • Instruction ID: a462269e752df95ff25e14b3a796066df2bc04b914b254561b7d72a71730ed32
                  • Opcode Fuzzy Hash: 8123377beed462e6961661804facbf7253ff77a4f37dd01311f62fdf20d6cf68
                  • Instruction Fuzzy Hash: C901817490014EEFCF40FF79E5A098E7BB5FB84304F204A6AD40597219EA306E459B90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ea8bdeea92618ff35e8626fc9ccf2daeecd8911a43252594dfa7a6ed97f66d87
                  • Instruction ID: d1c0e52077e8c20f143e5539235d78edd33f3f2c5581b5c25bf7bd8bc68d62a3
                  • Opcode Fuzzy Hash: ea8bdeea92618ff35e8626fc9ccf2daeecd8911a43252594dfa7a6ed97f66d87
                  • Instruction Fuzzy Hash: 51F0A7B3600200AFF7264A6AED44E83BFFAEF85765759406AE908C7312DB21D845C721
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 655838134978bb62001248aca21b856ddb5fb7cbb1a13cc269d54c94b98b2983
                  • Instruction ID: 72ebe3747cafb581794a934cbf8efea8602a558af5db938fbb27803927725a58
                  • Opcode Fuzzy Hash: 655838134978bb62001248aca21b856ddb5fb7cbb1a13cc269d54c94b98b2983
                  • Instruction Fuzzy Hash: 5EF01274A0011EEFCF44FF79E56089E7BB5FB88604B204E6AD40597218EB306E55DBD0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6bda00eb9ebdad612861d95fe10f60a1c43d5e5455b8c7c463ea41c6b2a1f566
                  • Instruction ID: 800577deb217c69c73a633ea5bad258b9296ca52c0c4bb66cfd683c82c6f5d02
                  • Opcode Fuzzy Hash: 6bda00eb9ebdad612861d95fe10f60a1c43d5e5455b8c7c463ea41c6b2a1f566
                  • Instruction Fuzzy Hash: F0F0E2396041658FCB46EB68E0609E97BF1EF8E600B1485AFE0068B667CA209C01CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 070b5289a75ab31b98e42357ef367146435533ea9e3336265017f06e2854821f
                  • Instruction ID: f2b7c1e6afce5832e733b21107ef93f44ec637ecb5de532f130a9e819931f57e
                  • Opcode Fuzzy Hash: 070b5289a75ab31b98e42357ef367146435533ea9e3336265017f06e2854821f
                  • Instruction Fuzzy Hash: 02F05470D0014DBFCB40EFBDD59568D7FB4FB85200F505AAED409AB310DA315E458791
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2fa86908a9123404306bfe30078d286325c0683e13e154442af66f7a0f650bed
                  • Instruction ID: 7646248ddf9da046df8c7c636fda303c487285676c1a30b8ab2b0692a12f8d37
                  • Opcode Fuzzy Hash: 2fa86908a9123404306bfe30078d286325c0683e13e154442af66f7a0f650bed
                  • Instruction Fuzzy Hash: ECF03A70961209EFCB48EF68E455BDD7FB0EB48301F104A66EA0497315EA305A45CF84
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4adf9cc3da5bd06eefa615cb99b270777a2eead674376b06e31501207b1f036b
                  • Instruction ID: c2fa42bf798f156e624736ea8edd89dc690d0b028c1cca30ad5954a2e4ceda63
                  • Opcode Fuzzy Hash: 4adf9cc3da5bd06eefa615cb99b270777a2eead674376b06e31501207b1f036b
                  • Instruction Fuzzy Hash: AFE04F363101145BC7249A4EE404D9ABBAEDFD9771B148037FA0CC7320CE71DC5296E4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dd154165c7edc3f4c65fbd2b19fe85a41903b8459263f7bda0bd8b7aa09a3e7b
                  • Instruction ID: 7338620245eff6d30fa0fc20bde35f65f18749ffee0ff8ea80a4788a09a938a9
                  • Opcode Fuzzy Hash: dd154165c7edc3f4c65fbd2b19fe85a41903b8459263f7bda0bd8b7aa09a3e7b
                  • Instruction Fuzzy Hash: 5EF03070D0010EEFCB40EFBDD56559CBBB5FB84200F605AAAC409AB210EA302F448B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 133d2a255ee559be199958572b6884d6deadf2c41e7b84cdb75c3a662e90b65b
                  • Instruction ID: 6f4d83b2092168b5a852e15d68ddde8a1fde8b9e48459759a8e1fd17ac5db441
                  • Opcode Fuzzy Hash: 133d2a255ee559be199958572b6884d6deadf2c41e7b84cdb75c3a662e90b65b
                  • Instruction Fuzzy Hash: FDE06D34425345CFD7499F70A56E2BA7F70DB07302B006989E44993101DE340150CA18
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3fa487bd24134a3b8e1897138df82b63545bf1cb9253e7f1e96a2c368f6be3cc
                  • Instruction ID: 9b15d4f6a1c690b4a72f2fa91ed8a1677c0b927e46cfbd6cbb54d26905e020dc
                  • Opcode Fuzzy Hash: 3fa487bd24134a3b8e1897138df82b63545bf1cb9253e7f1e96a2c368f6be3cc
                  • Instruction Fuzzy Hash: 50F0FE7096121DEFCB48EF79E455A9D7FB0EB44305F104A66E90493215EA306A45CB94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5bd40e4486d71530bf4ab4bdefa27341dc72c732a2446843527de50ab52a4b46
                  • Instruction ID: 4920f0e3b97dce6ebe35ce5906627f45955e470e18cff26a25236cd961c7adc9
                  • Opcode Fuzzy Hash: 5bd40e4486d71530bf4ab4bdefa27341dc72c732a2446843527de50ab52a4b46
                  • Instruction Fuzzy Hash: 09E092308443089FCB41EFA4E8150EA7BB4EF493107008AABCC45D7216D63A1E028B80
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5dbaae8d267af20822659efffd3bfe9b94169a49e6257babffeb380928519fbd
                  • Instruction ID: b028b4d629b7cfc678107dacca50adf3e37f78a7687471febf73dcbffe28f1fe
                  • Opcode Fuzzy Hash: 5dbaae8d267af20822659efffd3bfe9b94169a49e6257babffeb380928519fbd
                  • Instruction Fuzzy Hash: 73E092396004158FCB45FBAAF050999B3E9EB48604B10852AE50A8B755CA31AC408F94
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 15ed514f50da6a034585dc0e83fb4aa407bf89d44aabf14af3ef72f9b28c224b
                  • Instruction ID: 910ade209b66eb5323ae553968bd4521bcde4155c7cd7f412a4229a2234a9f78
                  • Opcode Fuzzy Hash: 15ed514f50da6a034585dc0e83fb4aa407bf89d44aabf14af3ef72f9b28c224b
                  • Instruction Fuzzy Hash: EFF01C30D09349EFCB05DFA8D45909CBFB1AF46304F0045EAE445E7251DB344A08CF41
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 012b5a3d377fd0bec23c6c29033d6b6f2ba37204a4c61ab5bdf6241224d3ae28
                  • Instruction ID: 3d3fdacace64be02d2d04976b3d9e0630cdd79edbc79e20e46bb38b66c6b5698
                  • Opcode Fuzzy Hash: 012b5a3d377fd0bec23c6c29033d6b6f2ba37204a4c61ab5bdf6241224d3ae28
                  • Instruction Fuzzy Hash: EFE0EC70872309DBD748AF75E45E6AABFB8EB0B306F01AD55F90993500DF3145408A59
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3ebb84d82bda738d8732281c4308bca761194818f340cd9bff80fbe32fb962ce
                  • Instruction ID: 0563fc7b46647505d4a1115bba6235decda010e11e8054e19bd51ad2f56cd0c2
                  • Opcode Fuzzy Hash: 3ebb84d82bda738d8732281c4308bca761194818f340cd9bff80fbe32fb962ce
                  • Instruction Fuzzy Hash: 52E0DF396442918FCB02AB3994548683FB2BF8A320310439BD845CB327CA319C428B81
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a1b6a7762856e7c458cb875e40bd471a3695b70d542ca4b10c367c25850cdbc7
                  • Instruction ID: efcb3814a354baa4eb3440b28d9cd266f34d3b00c8c6ae2f4bfa8f709df9acba
                  • Opcode Fuzzy Hash: a1b6a7762856e7c458cb875e40bd471a3695b70d542ca4b10c367c25850cdbc7
                  • Instruction Fuzzy Hash: 78E0C2366201108FD3086B14E84ABD97BAAFF88720F084166F50AC7351CF69DC01C744
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f84806da96d9197494d26e465feaed34e8bccefa6b5ef5660499a7274e3f6b63
                  • Instruction ID: 92fb9de411a772a8bfa7843f1e56d8926254927790f2b21dbecc1658552df166
                  • Opcode Fuzzy Hash: f84806da96d9197494d26e465feaed34e8bccefa6b5ef5660499a7274e3f6b63
                  • Instruction Fuzzy Hash: D1E02E3A7002109FC720AF18E841B9A7BE8FF0CB00F040166FA46C3360DB65EC01CB84
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fae8ce2c9f0981ec92cf96cab6d9bd6602bfa9f75b1003301614d252f6cc0a6a
                  • Instruction ID: f89bfc2a2122581f4fc0934629da79d165c46643b2949596741eee298344033e
                  • Opcode Fuzzy Hash: fae8ce2c9f0981ec92cf96cab6d9bd6602bfa9f75b1003301614d252f6cc0a6a
                  • Instruction Fuzzy Hash: 69E09A74E04208AFCB44DFA8D45559DBBB5AB48304F0085A9E449E7340EA345A04CF95
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4f8feacdd3a3ac68c192fa2f5aeba067ff31913e57a2502aaafe20aa2d8433f7
                  • Instruction ID: 1bbbdf48c20d57d65ad2701c46c6732a52a8e59c102e935a7d1515bf34ceea8e
                  • Opcode Fuzzy Hash: 4f8feacdd3a3ac68c192fa2f5aeba067ff31913e57a2502aaafe20aa2d8433f7
                  • Instruction Fuzzy Hash: 63D012315456849FD3064A248C553857FB09F17311B990097C552CA257C66C494ACB65
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 049d485c59ea899ab6640a48e2973431b02457cec9ba410ee492956c534435c6
                  • Instruction ID: ad7747b1ffd7b6572461b14dfadad16b3c69c9d029e595f888dbdaf7272ce982
                  • Opcode Fuzzy Hash: 049d485c59ea899ab6640a48e2973431b02457cec9ba410ee492956c534435c6
                  • Instruction Fuzzy Hash: 0DD0A932955308C28A048BA0A42D074BFB1DA8320D304A88AEC5E92A00DA2282108608
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 70b601fae09ee9e974e4468ccf724cf3c47d920e1994dd7891570a128a9b0cfc
                  • Instruction ID: 3e92cefda23b1f06e5c4302dab89f9e0e67e06273be76854af8f224cdd72814a
                  • Opcode Fuzzy Hash: 70b601fae09ee9e974e4468ccf724cf3c47d920e1994dd7891570a128a9b0cfc
                  • Instruction Fuzzy Hash: 97D0A734300514DFC7109B19E804E597BE9FF4D710F100156F546C7364CB61AC008B84
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 53b2123baffb589232999dfe09199d36dba96d4d139e5f17ec8dbabaa5226fb3
                  • Instruction ID: ba38a8305d6bf2163a6e52871fc0e2f21e2eaf2f6398cd092582fe0774c4770c
                  • Opcode Fuzzy Hash: 53b2123baffb589232999dfe09199d36dba96d4d139e5f17ec8dbabaa5226fb3
                  • Instruction Fuzzy Hash: 87D05E383202108FC708AB29E5498997BAAFF8862170441A6F90A87351CF719C00CB84
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: be3c811e291ad9f583588ca5c9c2926927cad15c62d8bcd77c5282a04a50066f
                  • Instruction ID: ae7ad0366e0d5984f8244eb3b4e86223eaada0ca9849f88e369bc80784a8a3c7
                  • Opcode Fuzzy Hash: be3c811e291ad9f583588ca5c9c2926927cad15c62d8bcd77c5282a04a50066f
                  • Instruction Fuzzy Hash: A8D01770D0020DEFCB40EFA9E91545EBBB9EB483007108AA6D80993208EA366E008F90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e71575e49e568920ca94ce5fecff0a64fabd9cd916599c139aeb8bdbb5a7cb34
                  • Instruction ID: e76bd19775e2c09d65167991083ff53870c1fe0d1b8fa09db6d1a9844ad877aa
                  • Opcode Fuzzy Hash: e71575e49e568920ca94ce5fecff0a64fabd9cd916599c139aeb8bdbb5a7cb34
                  • Instruction Fuzzy Hash: 55D0C7797506148FD744EB79E44491537B7BB8C7243504256E90DC732ADE31EC818B55
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ab08d30cc267f7ec255b51a5561f9d9232e4771b71cfd8f136cba4f974352e0f
                  • Instruction ID: 6321ca236aaf956f46bb82e62d10ef844f517f0bc6d10d9537cf9e551ae8a624
                  • Opcode Fuzzy Hash: ab08d30cc267f7ec255b51a5561f9d9232e4771b71cfd8f136cba4f974352e0f
                  • Instruction Fuzzy Hash: 65D02272E4E3C88FC3038E548E431243B20EA03202B0602C7DC84DB366D5258E1187A2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fa35753772269768b635d5265c8cff900785077ec6263ca6832f91fed03c7114
                  • Instruction ID: b77d1c3fd343f31ce5911ebdfbab4797fc70b8c4a93b8f98e0f5b7c755a94f1e
                  • Opcode Fuzzy Hash: fa35753772269768b635d5265c8cff900785077ec6263ca6832f91fed03c7114
                  • Instruction Fuzzy Hash: 25D0C93205E3808FC3460B20F85A0407B35AE02631B1446D3A86ACF197DA56889ECF91
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8d13244164822d19fc030560cd51636f1298811fa07da3e76185ce6f3b928008
                  • Instruction ID: c8076bb8ebb99fb6b9797df26390576548e1e4bedc706227c86d5b0e40ff13b3
                  • Opcode Fuzzy Hash: 8d13244164822d19fc030560cd51636f1298811fa07da3e76185ce6f3b928008
                  • Instruction Fuzzy Hash: B8C012315045758BC2586B58A0204DD3BB5BFDE6103054D99E04E4B15ACF624C0643D5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7f57640a3eb3fed86a1d953cd0c3cea4e2aeab62fcd727cd396e342953a8f929
                  • Instruction ID: ca9b62348f155cd3fa11d347c13e4d3160a47ce228ec8a3d2f51d75117d4967c
                  • Opcode Fuzzy Hash: 7f57640a3eb3fed86a1d953cd0c3cea4e2aeab62fcd727cd396e342953a8f929
                  • Instruction Fuzzy Hash: 48C09232A493624FC3030AB08C181E17BE0EE921613AF01E7D090C7661D2AC4A868791
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cfed8b1b420a2ff7a697df5475833a7160e02444b6c58aed48c8332f1a703260
                  • Instruction ID: ac8a8cdd6a387cabb28999e7e95688e18285ccd0b8f899d82a786f5a3bc313f1
                  • Opcode Fuzzy Hash: cfed8b1b420a2ff7a697df5475833a7160e02444b6c58aed48c8332f1a703260
                  • Instruction Fuzzy Hash: BBB0927190930CAF8710DE99980192ABBACDA0A214F0006DAF90897310E936A91056E6
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5aa3ea83cf2b86232d28e80f3f5b68ba0c10dbb13f94743943666aaa1eb0427f
                  • Instruction ID: a71e820ea6719d892dc954b0c11eb15bf12dfa72c9fd5873c6a13a8c1368350c
                  • Opcode Fuzzy Hash: 5aa3ea83cf2b86232d28e80f3f5b68ba0c10dbb13f94743943666aaa1eb0427f
                  • Instruction Fuzzy Hash: 4EB0123202030F4BCA807B5DF8158587B6D96C02083408D30F10E4551B5E6074018AC8
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9e3eec13af112bca44cddcba26d3c2d659d20a497ddb56ae4ef1d333000f3579
                  • Instruction ID: 5eef39d546df1ee82c0c7c914fc5c56911aef76f6dcdbdb29608f330827bf68b
                  • Opcode Fuzzy Hash: 9e3eec13af112bca44cddcba26d3c2d659d20a497ddb56ae4ef1d333000f3579
                  • Instruction Fuzzy Hash: B0B012320183088783405758FC06415739C6A406347348364B07D8A2D9CE17B8578B44
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.256602050.0000000001350000.00000040.00000800.00020000.00000000.sdmp, Offset: 01350000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_1350000_Invoice.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b1fc3a99ec8ab15a16afc849af8d8fb7fb186ea91fa6930313216e4e35258939
                  • Instruction ID: 71abdb06a40c81d910dd464a55353016d9f1ff56a4d086ed4fc87aaacf1784d2
                  • Opcode Fuzzy Hash: b1fc3a99ec8ab15a16afc849af8d8fb7fb186ea91fa6930313216e4e35258939
                  • Instruction Fuzzy Hash: D3C22634A00219CFDB69DF68C894BADBBB2FF49305F1084A9E949A7251CB35DE81CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Execution Graph

                  Execution Coverage:8.7%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:7.1%
                  Total number of Nodes:42
                  Total number of Limit Nodes:1
                  execution_graph 20037 3031930 20038 3031931 20037->20038 20039 303197d KiUserExceptionDispatcher 20038->20039 20042 3033c08 20039->20042 20044 3033c0c 20042->20044 20043 303198b 20044->20043 20048 303df43 20044->20048 20052 303dda8 20044->20052 20056 303dda3 20044->20056 20049 303de07 20048->20049 20050 303defa KiUserExceptionDispatcher 20049->20050 20051 303deeb 20049->20051 20050->20051 20051->20044 20053 303ddcf 20052->20053 20054 303deeb 20053->20054 20055 303defa KiUserExceptionDispatcher 20053->20055 20054->20044 20055->20054 20059 303dda8 20056->20059 20057 303defa KiUserExceptionDispatcher 20058 303deeb 20057->20058 20058->20044 20059->20057 20059->20058 20060 57edbf8 20061 57edbfb 20060->20061 20063 57edc03 20061->20063 20064 57ed164 20061->20064 20065 57ed16f 20064->20065 20066 57edffb 20065->20066 20068 57ed180 20065->20068 20066->20063 20069 57ee030 OleInitialize 20068->20069 20071 57ee094 20069->20071 20071->20066 20072 3032e1d 20073 3032df7 LdrInitializeThunk 20072->20073 20075 3032eab 20073->20075 20076 57ec040 20077 57ec044 20076->20077 20085 57e6f34 20077->20085 20079 57ec056 20080 57ec15c 20079->20080 20081 57ec0b2 20079->20081 20084 57ec0b9 20079->20084 20089 57e6e0c CallWindowProcW 20080->20089 20082 57ec10a CallWindowProcW 20081->20082 20081->20084 20082->20084 20086 57e6f39 20085->20086 20087 57ec10a CallWindowProcW 20086->20087 20088 57ec0b9 20086->20088 20087->20088 20088->20079

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1000 3032d38-3032d3e 1001 3032d40-3032d42 1000->1001 1002 3032d45-3032d47 1000->1002 1003 3032d44 1001->1003 1004 3032d49-3032d68 1001->1004 1002->1004 1003->1002 1005 3032d6a 1004->1005 1006 3032d6f-3032df5 1004->1006 1005->1006 1008 3032e5c-3032e72 1006->1008 1009 3032df7-3032e00 1008->1009 1010 3032e74-3032ea4 LdrInitializeThunk 1008->1010 1011 3032e02 1009->1011 1012 3032e07-3032e52 1009->1012 1016 3032eab-3032f6f 1010->1016 1011->1012 1017 3032e54 1012->1017 1018 3032e59 1012->1018 1025 3032f75-3032f95 1016->1025 1026 303388c-30338c3 1016->1026 1017->1018 1018->1008 1029 3033869-3033885 1025->1029 1030 303388b 1029->1030 1031 3032f9a-3032fa3 1029->1031 1030->1026 1032 3032fa5 1031->1032 1033 3032faa-3033010 1031->1033 1032->1033 1037 3033012 1033->1037 1038 3033017-30330a4 1033->1038 1037->1038 1044 30330b6-30330bd 1038->1044 1045 30330a6-30330ad 1038->1045 1048 30330c4-30330d1 1044->1048 1049 30330bf 1044->1049 1046 30330b4 1045->1046 1047 30330af 1045->1047 1046->1048 1047->1046 1050 30330d3 1048->1050 1051 30330d8-30330df 1048->1051 1049->1048 1050->1051 1052 30330e1 1051->1052 1053 30330e6-303313d 1051->1053 1052->1053 1056 3033144-303315b 1053->1056 1057 303313f 1053->1057 1058 3033166-303316e 1056->1058 1059 303315d-3033164 1056->1059 1057->1056 1060 303316f-3033179 1058->1060 1059->1060 1061 3033180-3033189 1060->1061 1062 303317b 1060->1062 1063 3033839-303383f 1061->1063 1062->1061 1064 3033845-303385f 1063->1064 1065 303318e-303319a 1063->1065 1073 3033861 1064->1073 1074 3033866 1064->1074 1066 30331a1-30331a6 1065->1066 1067 303319c 1065->1067 1068 30331e9-30331eb 1066->1068 1069 30331a8-30331b4 1066->1069 1067->1066 1075 30331f1-3033205 1068->1075 1071 30331b6 1069->1071 1072 30331bb-30331c0 1069->1072 1071->1072 1072->1068 1076 30331c2-30331cf 1072->1076 1073->1074 1074->1029 1077 3033817-3033824 1075->1077 1078 303320b-3033220 1075->1078 1079 30331d1 1076->1079 1080 30331d6-30331e7 1076->1080 1083 3033825-303382f 1077->1083 1081 3033222 1078->1081 1082 3033227-30332a4 1078->1082 1079->1080 1080->1075 1081->1082 1090 30332a6-30332cc 1082->1090 1091 30332ce 1082->1091 1084 3033831 1083->1084 1085 3033836 1083->1085 1084->1085 1085->1063 1092 30332d8-30332ec 1090->1092 1091->1092 1094 30332f2-30332fc 1092->1094 1095 3033447-303344c 1092->1095 1096 3033303-3033329 1094->1096 1097 30332fe 1094->1097 1098 30334b0-30334b2 1095->1098 1099 303344e-303346e 1095->1099 1101 3033340-3033342 1096->1101 1102 303332b-3033335 1096->1102 1097->1096 1100 30334b8-30334d8 1098->1100 1109 3033470-3033496 1099->1109 1110 3033498 1099->1110 1106 3033811-3033812 1100->1106 1107 30334de-30334e8 1100->1107 1105 30333cc-30333d8 1101->1105 1103 3033337 1102->1103 1104 303333c-303333f 1102->1104 1103->1104 1104->1101 1111 30333da 1105->1111 1112 30333df-30333e4 1105->1112 1115 3033813-3033815 1106->1115 1113 30334ea 1107->1113 1114 30334ef-3033518 1107->1114 1116 30334a2-30334ae 1109->1116 1110->1116 1111->1112 1117 30333e6-30333f3 1112->1117 1118 303340b-303340d 1112->1118 1113->1114 1119 3033532-3033540 1114->1119 1120 303351a-3033524 1114->1120 1115->1083 1116->1100 1123 30333f5 1117->1123 1124 30333fa-3033409 1117->1124 1125 3033413-3033427 1118->1125 1121 30335d9-30335e8 1119->1121 1126 3033526 1120->1126 1127 303352b-3033531 1120->1127 1130 30335ea 1121->1130 1131 30335ef-30335f4 1121->1131 1123->1124 1124->1125 1128 3033347-303335c 1125->1128 1129 303342d-3033442 1125->1129 1126->1127 1127->1119 1134 3033363-30333c1 1128->1134 1135 303335e 1128->1135 1129->1115 1130->1131 1132 30335f6-3033606 1131->1132 1133 303361e-3033620 1131->1133 1136 3033608 1132->1136 1137 303360d-303361c 1132->1137 1138 3033626-303363a 1133->1138 1152 30333c3 1134->1152 1153 30333c8-30333cb 1134->1153 1135->1134 1136->1137 1137->1138 1139 3033640-30336ae 1138->1139 1140 3033545-3033560 1138->1140 1150 30336b0-30336b2 1139->1150 1151 30336b7-303380d 1139->1151 1142 3033562 1140->1142 1143 3033567-30335cb 1140->1143 1142->1143 1157 30335d2-30335d8 1143->1157 1158 30335cd 1143->1158 1154 303380e-303380f 1150->1154 1151->1154 1152->1153 1153->1105 1154->1064 1157->1121 1158->1157
                  APIs
                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 0ec4d10b9cca7ccd71e69343d99840bbcb3a740ce664afa6a2842ccb57dbe3e8
                  • Instruction ID: 328feed257149f36460dd7c48983c0e0d0d8a8f49ab40cded4db52c2dc4e1773
                  • Opcode Fuzzy Hash: 0ec4d10b9cca7ccd71e69343d99840bbcb3a740ce664afa6a2842ccb57dbe3e8
                  • Instruction Fuzzy Hash: 3872AB74E01269CFDB64DF69C884BDDBBB6BB8A300F1481EAD409A7255DB349E81CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1700 303a9c8-303a9d8 1702 303a9da 1700->1702 1703 303a9df-303a9eb 1700->1703 1704 303ab0b-303ab15 1702->1704 1706 303a9f2-303aa07 1703->1706 1707 303a9ed 1703->1707 1710 303ab1b-303ab5b call 3033a90 1706->1710 1711 303aa0d-303aa18 1706->1711 1707->1704 1729 303ab62-303ab96 1710->1729 1714 303ab16 1711->1714 1715 303aa1e-303aa25 1711->1715 1714->1710 1717 303aa52-303aa5d 1715->1717 1718 303aa27-303aa3e 1715->1718 1722 303aa6a-303aa74 1717->1722 1723 303aa5f-303aa67 1717->1723 1718->1729 1730 303aa44-303aa47 1718->1730 1731 303aa7a-303aa84 1722->1731 1732 303aafe-303ab03 1722->1732 1723->1722 1750 303ab9c-303abda call 3033a90 call 30338f8 1729->1750 1730->1714 1734 303aa4d-303aa50 1730->1734 1731->1714 1739 303aa8a-303aaa6 1731->1739 1732->1704 1734->1717 1734->1718 1744 303aaaa-303aaad 1739->1744 1745 303aaa8 1739->1745 1746 303aab4-303aab7 1744->1746 1747 303aaaf-303aab2 1744->1747 1745->1704 1749 303aaba-303aac8 1746->1749 1747->1749 1749->1714 1755 303aaca-303aad1 1749->1755 1763 303abe1-303abe2 1750->1763 1764 303abdc-303abdf 1750->1764 1755->1704 1757 303aad3-303aad9 1755->1757 1757->1714 1758 303aadb-303aae0 1757->1758 1758->1714 1760 303aae2-303aaf5 1758->1760 1760->1714 1765 303aaf7-303aafa 1760->1765 1766 303abe4 1763->1766 1767 303abe9-303ac17 1763->1767 1764->1763 1765->1757 1768 303aafc 1765->1768 1766->1750 1769 303abe6-303abe7 1766->1769 1770 303ac19 1767->1770 1771 303ac1e-303acb4 call 3033bb8 1767->1771 1768->1704 1769->1767 1770->1771 1774 303ad53-303ad59 1771->1774 1775 303acb9-303accc 1774->1775 1776 303ad5f-303ad77 1774->1776 1777 303acd3-303ad24 1775->1777 1778 303acce 1775->1778 1779 303ad8b-303ad9e 1776->1779 1780 303ad79-303ad86 1776->1780 1797 303ad37-303ad49 1777->1797 1798 303ad26-303ad34 1777->1798 1778->1777 1781 303ada0 1779->1781 1782 303ada5-303adc1 1779->1782 1783 303b121-303b21e 1780->1783 1781->1782 1786 303adc3 1782->1786 1787 303adc8-303adec 1782->1787 1788 303b220-303b225 call 3033bb8 1783->1788 1789 303b226-303b230 1783->1789 1786->1787 1794 303adf3-303ae25 1787->1794 1795 303adee 1787->1795 1788->1789 1803 303ae27 1794->1803 1804 303ae2c-303ae6e 1794->1804 1795->1794 1800 303ad50 1797->1800 1801 303ad4b 1797->1801 1798->1776 1800->1774 1801->1800 1803->1804 1806 303ae70 1804->1806 1807 303ae75-303ae7e 1804->1807 1806->1807 1808 303b0a6-303b0ac 1807->1808 1809 303ae83-303aea8 1808->1809 1810 303b0b2-303b0c5 1808->1810 1811 303aeaa 1809->1811 1812 303aeaf-303aee6 1809->1812 1813 303b0c7 1810->1813 1814 303b0cc-303b0e7 1810->1814 1811->1812 1822 303aee8 1812->1822 1823 303aeed-303af1f 1812->1823 1813->1814 1815 303b0e9 1814->1815 1816 303b0ee-303b102 1814->1816 1815->1816 1820 303b104 1816->1820 1821 303b109-303b10e call 303b2a9 1816->1821 1820->1821 1824 303b114-303b11f 1821->1824 1822->1823 1826 303af83-303af96 1823->1826 1827 303af21-303af46 1823->1827 1824->1783 1830 303af98 1826->1830 1831 303af9d-303afc2 1826->1831 1828 303af48 1827->1828 1829 303af4d-303af7b 1827->1829 1828->1829 1829->1826 1830->1831 1834 303afd1-303b009 1831->1834 1835 303afc4-303afc5 1831->1835 1836 303b010-303b071 call 303a9c8 1834->1836 1837 303b00b 1834->1837 1835->1810 1843 303b073 1836->1843 1844 303b078-303b09c 1836->1844 1837->1836 1843->1844 1847 303b0a3 1844->1847 1848 303b09e 1844->1848 1847->1808 1848->1847
                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1a6ea4f5cd58d35fc25947e6b4a32d8607244e8bfe713f3f7a63ca9d6c6bdf97
                  • Instruction ID: 7619a4391a2e5dded52e0ea11a3d68fd14f1ef67e93b40c295cdec8ce3679ff1
                  • Opcode Fuzzy Hash: 1a6ea4f5cd58d35fc25947e6b4a32d8607244e8bfe713f3f7a63ca9d6c6bdf97
                  • Instruction Fuzzy Hash: BC325774E01219CFDB18DFA8C884BADFBB6BF89300F1485A9D449AB355DB349981CF90
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1977 3033c08-3033c0a 1978 3033c11-3033c12 1977->1978 1979 3033c0c-3033c0e 1977->1979 1982 3033c14 1978->1982 1983 3033c19-3033c38 1978->1983 1980 3033c10 1979->1980 1981 3033c15-3033c17 1979->1981 1980->1978 1981->1983 1982->1981 1984 3033c3a 1983->1984 1985 3033c3f-3033cd0 1983->1985 1984->1985 1989 3033cd6-3033ce6 1985->1989 1990 3034024-3034056 1985->1990 2042 3033ce9 call 30341e9 1989->2042 2043 3033ce9 call 30341f8 1989->2043 2044 3033ce9 call 303453e 1989->2044 1994 3033cef-3033cfe 2045 3033d00 call 303abe8 1994->2045 2046 3033d00 call 303a9b8 1994->2046 2047 3033d00 call 303a9c8 1994->2047 2048 3033d00 call 303afcc 1994->2048 1995 3033d06-3033d22 1997 3033d24 1995->1997 1998 3033d29-3033d32 1995->1998 1997->1998 1999 3034017-303401d 1998->1999 2000 3034023 1999->2000 2001 3033d37-3033d43 1999->2001 2000->1990 2039 3033d45 call 303df43 2001->2039 2040 3033d45 call 303dda3 2001->2040 2041 3033d45 call 303dda8 2001->2041 2002 3033d4b-3033db1 2006 3033db7-3033e25 2002->2006 2007 3033e6d-3033ec8 2002->2007 2016 3033e27-3033e67 2006->2016 2017 3033e68-3033e6b 2006->2017 2018 3033ec9-3033f19 2007->2018 2016->2017 2017->2018 2023 3034002-303400d 2018->2023 2024 3033f1f-3034001 2018->2024 2025 3034014 2023->2025 2026 303400f 2023->2026 2024->2023 2025->1999 2026->2025 2039->2002 2040->2002 2041->2002 2042->1994 2043->1994 2044->1994 2045->1995 2046->1995 2047->1995 2048->1995
                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1033b4f3f833d55c689b70dd944ba3db5d6a253e5eb212aa585bcaac3283acd8
                  • Instruction ID: 88b2d956a7989b050d85c7f8aca8411021aea7b7f865197abe31dd0bde2f09c7
                  • Opcode Fuzzy Hash: 1033b4f3f833d55c689b70dd944ba3db5d6a253e5eb212aa585bcaac3283acd8
                  • Instruction Fuzzy Hash: 5CD19F74E01218CFDB58DFA9D998B9DBBB2BF89300F1081AAD809AB355DB355D85CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 58941791e7ed585a4b5e03026cedf07628a9a95a5578b1edaeabc5e4eb9520ac
                  • Instruction ID: 68e85a996887c55a74e4f740352585de4a8c9320970e3614ac797d337acb99e5
                  • Opcode Fuzzy Hash: 58941791e7ed585a4b5e03026cedf07628a9a95a5578b1edaeabc5e4eb9520ac
                  • Instruction Fuzzy Hash: EAA1F170E01208CFDB14DFA9C988BDDBBB1FF89304F248269D509AB2A1DB759985CF54
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 06a53a88f0fcdf0a064791e1821a747ca7cdfe4f45557213c46da560e12de405
                  • Instruction ID: 0014e43c98122b9ffc42f1692241143dcf79f4cf438b250fa17c22155b21a170
                  • Opcode Fuzzy Hash: 06a53a88f0fcdf0a064791e1821a747ca7cdfe4f45557213c46da560e12de405
                  • Instruction Fuzzy Hash: 8EA10170E01208CFDB14DFA9C988B9DBBB1FF89304F248269D508AB2A1DB759985CF55
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5a25a74c9cb4d144b59d779cbfeb493a3c8473642add3c1bf6132aefd8d96ec1
                  • Instruction ID: 7996e317fb191cc09265448d589940b1eb253eb77e7f4b265823135a6929578d
                  • Opcode Fuzzy Hash: 5a25a74c9cb4d144b59d779cbfeb493a3c8473642add3c1bf6132aefd8d96ec1
                  • Instruction Fuzzy Hash: 5C910374E01208CFDB14DFA9C888BDCBBB5FF49310F2482A9E409AB291DB759985CF15
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1171 303dda8-303ddcd 1172 303ddd4-303de3b call 3033bb8 1171->1172 1173 303ddcf 1171->1173 1179 303dec5-303decb 1172->1179 1173->1172 1180 303ded1-303dee9 1179->1180 1181 303de40-303de53 1179->1181 1182 303deeb-303def8 1180->1182 1183 303defa-303df1a KiUserExceptionDispatcher 1180->1183 1184 303de55 1181->1184 1185 303de5a-303de96 1181->1185 1186 303df1c-303dff8 1182->1186 1183->1186 1184->1185 1195 303dea9-303debb 1185->1195 1196 303de98-303dea6 1185->1196 1189 303e000-303e009 1186->1189 1190 303dffa-303dfff call 3033bb8 1186->1190 1190->1189 1199 303dec2 1195->1199 1200 303debd 1195->1200 1196->1180 1199->1179 1200->1199
                  APIs
                  • KiUserExceptionDispatcher.NTDLL(000000FF), ref: 0303DF0A
                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID: DispatcherExceptionUser
                  • String ID:
                  • API String ID: 6842923-0
                  • Opcode ID: 442ab97cd99664a23506b6eaf15fa876a17b0832035332c066afa82493d6bb90
                  • Instruction ID: b9b31246911c97e253197cbc30f478b4b8059e9a82c9bc94a6d1617cbd01d51c
                  • Opcode Fuzzy Hash: 442ab97cd99664a23506b6eaf15fa876a17b0832035332c066afa82493d6bb90
                  • Instruction Fuzzy Hash: 145100B4D02208DFDB18DFAAD8886DDFBB6BF89310F14C529E414AB294DB749945CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1201 303df43-303df4d 1202 303df59-303df5c 1201->1202 1203 303df4f-303df57 1201->1203 1204 303df5f-303df65 1202->1204 1203->1204 1205 303df67 1204->1205 1206 303df6e-303df6f 1204->1206 1205->1206 1207 303df22-303df34 1205->1207 1208 303dfde-303dfec 1206->1208 1209 303df36 1207->1209 1210 303df3d-303df3e 1207->1210 1227 303dff4-303dff8 1208->1227 1209->1206 1209->1207 1209->1210 1211 303de22-303de3b 1209->1211 1212 303de40-303de53 1209->1212 1213 303de07-303de0d call 3033bb8 1209->1213 1214 303dea5-303dea6 1209->1214 1215 303deeb-303def8 1209->1215 1216 303deaa-303debb 1209->1216 1217 303dea8 1209->1217 1218 303ded1-303dee9 1209->1218 1219 303de14-303de1b 1209->1219 1220 303defa-303df1a KiUserExceptionDispatcher 1209->1220 1221 303de98-303dea2 1209->1221 1222 303df1c-303df1d 1209->1222 1210->1208 1229 303dec5-303decb 1211->1229 1230 303de55 1212->1230 1231 303de5a-303de96 1212->1231 1213->1219 1214->1218 1215->1222 1225 303dec2 1216->1225 1226 303debd 1216->1226 1224 303dea9 1217->1224 1218->1215 1218->1220 1219->1211 1220->1222 1221->1214 1222->1227 1224->1216 1225->1229 1226->1225 1232 303e000-303e009 1227->1232 1233 303dffa-303dfff call 3033bb8 1227->1233 1229->1212 1229->1218 1230->1231 1231->1221 1231->1224 1233->1232
                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 709001d959d41919d07da3279a1a69602afdcac13df993a94090e5a770f6f230
                  • Instruction ID: eaa7af7ce8076d5a60dcd4fdbb6e490fff8e82566bb12c521b33b7ead1ad96e1
                  • Opcode Fuzzy Hash: 709001d959d41919d07da3279a1a69602afdcac13df993a94090e5a770f6f230
                  • Instruction Fuzzy Hash: 5151F0B4D06208CFCB14DFA9D4846DCFBBABF4A311F248569E419BB294D7749885CF14
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1240 3031921-3031922 1241 3031924-3031928 1240->1241 1242 3031929-303192a 1240->1242 1241->1242 1243 3031931-3031945 1242->1243 1244 303192c-303192e 1242->1244 1245 3031947 1243->1245 1246 303194c-303196f 1243->1246 1244->1243 1245->1246 1251 3031976-303198b call 3031bff KiUserExceptionDispatcher call 3033c08 1246->1251 1254 3031992 1251->1254 1255 3031999 1254->1255 1256 30319a0-30319ae 1255->1256 1259 30319b5-30319bc 1256->1259 1261 30319c3 1259->1261 1262 30319ca 1261->1262 1263 30319d1 1262->1263 1264 30319d8-3031a0c 1263->1264 1272 3031a13 1264->1272 1273 3031a1a-3031a21 1272->1273 1275 3031a28-3031a51 1273->1275 1277 3031a53 1275->1277 1278 3031a5e 1275->1278 1279 3031a59-3031a5c 1277->1279 1280 3031a65-3031a66 1278->1280 1281 3031a67 1279->1281 1280->1281 1282 3031a6d-3031a72 1281->1282
                  APIs
                  • KiUserExceptionDispatcher.NTDLL ref: 0303197E
                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID: DispatcherExceptionUser
                  • String ID:
                  • API String ID: 6842923-0
                  • Opcode ID: b2e80622c493232b8e32083f2668aced9c22d2ffff1884932547b2adc69ae1a0
                  • Instruction ID: e902414b6f08dc192db4c2f9a625829d2aff2e43e88cfa62a74156a44d9615d0
                  • Opcode Fuzzy Hash: b2e80622c493232b8e32083f2668aced9c22d2ffff1884932547b2adc69ae1a0
                  • Instruction Fuzzy Hash: 3B3184718253069FC719BFB0E5AC2AE7BB4FB0F313B046C55E01AD919ADB3A0585CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1285 3032e1d-3032e44 1289 3032e46-3032e52 1285->1289 1290 3032e54 1289->1290 1291 3032e59-3032e72 1289->1291 1290->1291 1293 3032df7-3032e00 1291->1293 1294 3032e74-3032ea4 LdrInitializeThunk 1291->1294 1295 3032e02 1293->1295 1296 3032e07-3032e1b 1293->1296 1299 3032eab-3032f6f 1294->1299 1295->1296 1296->1289 1306 3032f75-3032f95 1299->1306 1307 303388c-30338c3 1299->1307 1310 3033869-3033885 1306->1310 1311 303388b 1310->1311 1312 3032f9a-3032fa3 1310->1312 1311->1307 1313 3032fa5 1312->1313 1314 3032faa-3033010 1312->1314 1313->1314 1318 3033012 1314->1318 1319 3033017-30330a4 1314->1319 1318->1319 1325 30330b6-30330bd 1319->1325 1326 30330a6-30330ad 1319->1326 1329 30330c4-30330d1 1325->1329 1330 30330bf 1325->1330 1327 30330b4 1326->1327 1328 30330af 1326->1328 1327->1329 1328->1327 1331 30330d3 1329->1331 1332 30330d8-30330df 1329->1332 1330->1329 1331->1332 1333 30330e1 1332->1333 1334 30330e6-303313d 1332->1334 1333->1334 1337 3033144-303315b 1334->1337 1338 303313f 1334->1338 1339 3033166-303316e 1337->1339 1340 303315d-3033164 1337->1340 1338->1337 1341 303316f-3033179 1339->1341 1340->1341 1342 3033180-3033189 1341->1342 1343 303317b 1341->1343 1344 3033839-303383f 1342->1344 1343->1342 1345 3033845-303385f 1344->1345 1346 303318e-303319a 1344->1346 1354 3033861 1345->1354 1355 3033866 1345->1355 1347 30331a1-30331a6 1346->1347 1348 303319c 1346->1348 1349 30331e9-30331eb 1347->1349 1350 30331a8-30331b4 1347->1350 1348->1347 1356 30331f1-3033205 1349->1356 1352 30331b6 1350->1352 1353 30331bb-30331c0 1350->1353 1352->1353 1353->1349 1357 30331c2-30331cf 1353->1357 1354->1355 1355->1310 1358 3033817-3033824 1356->1358 1359 303320b-3033220 1356->1359 1360 30331d1 1357->1360 1361 30331d6-30331e7 1357->1361 1364 3033825-303382f 1358->1364 1362 3033222 1359->1362 1363 3033227-30332a4 1359->1363 1360->1361 1361->1356 1362->1363 1371 30332a6-30332cc 1363->1371 1372 30332ce 1363->1372 1365 3033831 1364->1365 1366 3033836 1364->1366 1365->1366 1366->1344 1373 30332d8-30332ec 1371->1373 1372->1373 1375 30332f2-30332fc 1373->1375 1376 3033447-303344c 1373->1376 1377 3033303-3033329 1375->1377 1378 30332fe 1375->1378 1379 30334b0-30334b2 1376->1379 1380 303344e-303346e 1376->1380 1382 3033340-3033342 1377->1382 1383 303332b-3033335 1377->1383 1378->1377 1381 30334b8-30334d8 1379->1381 1390 3033470-3033496 1380->1390 1391 3033498 1380->1391 1387 3033811-3033812 1381->1387 1388 30334de-30334e8 1381->1388 1386 30333cc-30333d8 1382->1386 1384 3033337 1383->1384 1385 303333c-303333f 1383->1385 1384->1385 1385->1382 1392 30333da 1386->1392 1393 30333df-30333e4 1386->1393 1396 3033813-3033815 1387->1396 1394 30334ea 1388->1394 1395 30334ef-3033518 1388->1395 1397 30334a2-30334ae 1390->1397 1391->1397 1392->1393 1398 30333e6-30333f3 1393->1398 1399 303340b-303340d 1393->1399 1394->1395 1400 3033532-3033540 1395->1400 1401 303351a-3033524 1395->1401 1396->1364 1397->1381 1404 30333f5 1398->1404 1405 30333fa-3033409 1398->1405 1406 3033413-3033427 1399->1406 1402 30335d9-30335e8 1400->1402 1407 3033526 1401->1407 1408 303352b-3033531 1401->1408 1411 30335ea 1402->1411 1412 30335ef-30335f4 1402->1412 1404->1405 1405->1406 1409 3033347-303335c 1406->1409 1410 303342d-3033442 1406->1410 1407->1408 1408->1400 1415 3033363-30333c1 1409->1415 1416 303335e 1409->1416 1410->1396 1411->1412 1413 30335f6-3033606 1412->1413 1414 303361e-3033620 1412->1414 1417 3033608 1413->1417 1418 303360d-303361c 1413->1418 1419 3033626-303363a 1414->1419 1433 30333c3 1415->1433 1434 30333c8-30333cb 1415->1434 1416->1415 1417->1418 1418->1419 1420 3033640-30336ae 1419->1420 1421 3033545-3033560 1419->1421 1431 30336b0-30336b2 1420->1431 1432 30336b7-303380d 1420->1432 1423 3033562 1421->1423 1424 3033567-30335cb 1421->1424 1423->1424 1438 30335d2-30335d8 1424->1438 1439 30335cd 1424->1439 1435 303380e-303380f 1431->1435 1432->1435 1433->1434 1434->1386 1435->1345 1438->1402 1439->1438
                  APIs
                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 6fcdcf6ef35d96776c3773b459c85552e80125cc9eb61e53f6a9c1c0bd367161
                  • Instruction ID: 1a4e1c543bff65b61cfb4ccb0d9972d2a24938d50ca15accef70ffd9fa8fb237
                  • Opcode Fuzzy Hash: 6fcdcf6ef35d96776c3773b459c85552e80125cc9eb61e53f6a9c1c0bd367161
                  • Instruction Fuzzy Hash: C9419D74A02228CFCB69DF68D898AD9B7B6FB89301F1045EAD409A7361D7359E81CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1452 3031930-3031945 1454 3031947 1452->1454 1455 303194c-3031a51 call 3031bff KiUserExceptionDispatcher call 3033c08 1452->1455 1454->1455 1486 3031a53-3031a5c 1455->1486 1487 3031a5e-3031a66 1455->1487 1490 3031a67 1486->1490 1487->1490 1491 3031a6d-3031a72 1490->1491
                  APIs
                  • KiUserExceptionDispatcher.NTDLL ref: 0303197E
                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID: DispatcherExceptionUser
                  • String ID:
                  • API String ID: 6842923-0
                  • Opcode ID: 091e734fae40cee241de8b43f329b6253ba85b4b0cfa423bbf6c0bfc7c9607ae
                  • Instruction ID: b7a538b2c92e11140e8baba1e6b54f08e043704e0b76391758582e469d4d9204
                  • Opcode Fuzzy Hash: 091e734fae40cee241de8b43f329b6253ba85b4b0cfa423bbf6c0bfc7c9607ae
                  • Instruction Fuzzy Hash: FB312071921306DFC718BFB0A5AC2AE7BB5FB0F713B006C55E00A99299DB3A4595CB60
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1494 57e6f34-57ec0ac 1500 57ec15c-57ec17c call 57e6e0c 1494->1500 1501 57ec0b2-57ec0b7 1494->1501 1509 57ec17f-57ec18c 1500->1509 1502 57ec10a-57ec142 CallWindowProcW 1501->1502 1503 57ec0b9-57ec0f0 1501->1503 1506 57ec14b-57ec15a 1502->1506 1507 57ec144-57ec14a 1502->1507 1512 57ec0f9-57ec108 1503->1512 1513 57ec0f2-57ec0f8 1503->1513 1506->1509 1507->1506 1512->1509 1513->1512
                  APIs
                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 057EC131
                  Memory Dump Source
                  • Source File: 00000001.00000002.514617206.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_57e0000_RegAsm.jbxd
                  Similarity
                  • API ID: CallProcWindow
                  • String ID:
                  • API String ID: 2714655100-0
                  • Opcode ID: 45ffaead816daa421a7f6a0bc57ef6cafb7dc05a420b7c0e6fbe12248e015e0e
                  • Instruction ID: 7ca19b160fdec363fffb6d110b4ac074e7ecdaca008ebe382387b9f24579f951
                  • Opcode Fuzzy Hash: 45ffaead816daa421a7f6a0bc57ef6cafb7dc05a420b7c0e6fbe12248e015e0e
                  • Instruction Fuzzy Hash: 57414AB8A003058FCB15CF59C888AAABBF9FF9D314F24C559D419A7321D774A841DFA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1515 57ed180-57ee092 OleInitialize 1518 57ee09b-57ee0b8 1515->1518 1519 57ee094-57ee09a 1515->1519 1519->1518
                  APIs
                  • OleInitialize.OLE32(00000000), ref: 057EE085
                  Memory Dump Source
                  • Source File: 00000001.00000002.514617206.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_57e0000_RegAsm.jbxd
                  Similarity
                  • API ID: Initialize
                  • String ID:
                  • API String ID: 2538663250-0
                  • Opcode ID: 5176259ee3a2f4286b4ff88919db7be81f6db6173f6a5f0b918e5710bcad13b1
                  • Instruction ID: 5fb59e7343d8742771f324aa04719b4c10b13ae199623a70ba912c222ba74d1c
                  • Opcode Fuzzy Hash: 5176259ee3a2f4286b4ff88919db7be81f6db6173f6a5f0b918e5710bcad13b1
                  • Instruction Fuzzy Hash: 041106B1D003489FCB20CF9AD484BDEBBF8EB58314F248859D519A7600D379A944CFA5
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1522 57ee028-57ee02a 1523 57ee02c 1522->1523 1524 57ee031-57ee092 OleInitialize 1522->1524 1523->1524 1525 57ee09b-57ee0b8 1524->1525 1526 57ee094-57ee09a 1524->1526 1526->1525
                  APIs
                  • OleInitialize.OLE32(00000000), ref: 057EE085
                  Memory Dump Source
                  • Source File: 00000001.00000002.514617206.00000000057E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_57e0000_RegAsm.jbxd
                  Similarity
                  • API ID: Initialize
                  • String ID:
                  • API String ID: 2538663250-0
                  • Opcode ID: 2067aaaf09dd2da68008d85dd7c4b575e084cb0bee3be8117c078e1ea4ec7066
                  • Instruction ID: 7b1205f7b133accc5c4ec3fbb281304d28d1966b956d49ca95157e87ea303c47
                  • Opcode Fuzzy Hash: 2067aaaf09dd2da68008d85dd7c4b575e084cb0bee3be8117c078e1ea4ec7066
                  • Instruction Fuzzy Hash: 8D1136B59002488FCB20CFA9C484BDEBFF4EB58324F24885AD859A7300C379A945CFA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.512710786.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_168d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d6c7e201dd8238f711053d2de3128182db5f33119667cb979b461a02e8b6eda0
                  • Instruction ID: 0d6e616e26e147eff7e40467daf4505a213a53909df24cac041b345fa4c24834
                  • Opcode Fuzzy Hash: d6c7e201dd8238f711053d2de3128182db5f33119667cb979b461a02e8b6eda0
                  • Instruction Fuzzy Hash: 73210371500248DFDB05EF58DCC0B16BF66FB84328F208669E9090B286C336D896CBB1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.512710786.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_168d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6c79638a1917a3e4f20c90d8663931129a3590d596905fd4a24b7ea6a4250a80
                  • Instruction ID: e15bea12dc6d79ba2917c59ba7949064c6f4c9633a97d66c57295d8033d0f454
                  • Opcode Fuzzy Hash: 6c79638a1917a3e4f20c90d8663931129a3590d596905fd4a24b7ea6a4250a80
                  • Instruction Fuzzy Hash: D221D671544244DFDB16EF58DDC0B26BF65FB84318F24866AE9090B286C336D856CBB2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.512765275.000000000169D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0169D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_169d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e365a0ceb434cf7df4133901fbed4ad13eb7dbc05904f5f5e83114fc772f7352
                  • Instruction ID: d1cc68437305eb0cb931bd3bd25a966f052d417a647c3d272635c0d7b6ffd91f
                  • Opcode Fuzzy Hash: e365a0ceb434cf7df4133901fbed4ad13eb7dbc05904f5f5e83114fc772f7352
                  • Instruction Fuzzy Hash: BF21CF71604240DFDF15CF68D8C4B26BB69EB84354F20C679D84A4B346C33AD847CAA1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.512765275.000000000169D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0169D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_169d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3daf1e82b52eed62646207538e24c76f8fc0a065a9c012f54bb5047698e9a6ef
                  • Instruction ID: 81f5eb253d8e008a0f07e461cdd753c34ec6ead734821fc6b4e972d69f182ca6
                  • Opcode Fuzzy Hash: 3daf1e82b52eed62646207538e24c76f8fc0a065a9c012f54bb5047698e9a6ef
                  • Instruction Fuzzy Hash: 20219F755083809FDB02CF64D994B11BFB5EB46314F24C5EAD8498F2A7C33AD816CB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.512710786.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_168d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fe138b9911e6ea3d89020ae8d569046520ae6eb03e5c7ee4123045da37d9d711
                  • Instruction ID: ff2c4d9d8fece1df6b1d8a240ca17529812a5c7ff660d2e8d6e98f193d883a58
                  • Opcode Fuzzy Hash: fe138b9911e6ea3d89020ae8d569046520ae6eb03e5c7ee4123045da37d9d711
                  • Instruction Fuzzy Hash: 8011BE76904284CFDB12DF54D9C4B16BF62FB84324F24C6AAD8094B257C33AD45ACBA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.512710786.000000000168D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0168D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_168d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fe138b9911e6ea3d89020ae8d569046520ae6eb03e5c7ee4123045da37d9d711
                  • Instruction ID: 47353a92b681569a0dc489bbccacd11188b3442e51add79157b891e1415de3f2
                  • Opcode Fuzzy Hash: fe138b9911e6ea3d89020ae8d569046520ae6eb03e5c7ee4123045da37d9d711
                  • Instruction Fuzzy Hash: CD11EE76504284CFCB02DF04D9C4B16BF72FB84324F24C6A9D8080B257C33AD49ACBA2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4a0a922aef5a233b4eda53ff0948b88a0a9422a5fb8e970c07f1e64bec96f8c0
                  • Instruction ID: 3d1182d01fc6d2e5c5cddfacc1b02911136b90e74521811dca6b825bb7a6a42c
                  • Opcode Fuzzy Hash: 4a0a922aef5a233b4eda53ff0948b88a0a9422a5fb8e970c07f1e64bec96f8c0
                  • Instruction Fuzzy Hash: 60529C74E01229CFDB68DF69C884B9DBBB6BF89300F1085EAD409A7254DB359E81CF50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f0a97784df5a751482688488177546b3343f249c4018ad5a03be189c92c1e413
                  • Instruction ID: defb1f0d4fe4b669e1e5e553c2c0f4ccdf9d39488c4283145c75506fc1d71aaf
                  • Opcode Fuzzy Hash: f0a97784df5a751482688488177546b3343f249c4018ad5a03be189c92c1e413
                  • Instruction Fuzzy Hash: 0AD1D374E01259CFDB14DFA9D994B9DBBB2EF89300F2080AAD809AB355DB355E85CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8b16cf3ef3bdff5a1547c28fb69989ddc154783f21fcd205bdf90f9d2e8b464b
                  • Instruction ID: faef8ba8b3f28120e59a5f89afcce9231a8dce07d32cd731303d5569cf5d9799
                  • Opcode Fuzzy Hash: 8b16cf3ef3bdff5a1547c28fb69989ddc154783f21fcd205bdf90f9d2e8b464b
                  • Instruction Fuzzy Hash: B8D1D174E01218CFDB18DFA9D994B9DBBB2EF89300F2081AAD809AB355DB355D85CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d4117e38db02b4cd6aeb8db68b48ec654e14227622b5a27df288c54c160d139b
                  • Instruction ID: e9e920101e05af90106bdb8122c794e1e1c8c2d92019a4be07c60c6ee339d400
                  • Opcode Fuzzy Hash: d4117e38db02b4cd6aeb8db68b48ec654e14227622b5a27df288c54c160d139b
                  • Instruction Fuzzy Hash: 52D1E174E01218CFDB18DFA9D994BADBBB2BF89300F1481AAD809AB355DB345D85CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a9c2aecf92e764cdcafde5cdf347a5c52ab52ef1695a6f1331a927e1717cec83
                  • Instruction ID: 0a5aea831b5907388d1c839aaec2c6f10dfbd59fb961deb4bf4df87407adb169
                  • Opcode Fuzzy Hash: a9c2aecf92e764cdcafde5cdf347a5c52ab52ef1695a6f1331a927e1717cec83
                  • Instruction Fuzzy Hash: 4ED1C274E01218CFDB58DFA9D994B9DBBB2EF89300F1081AAD809AB355DB355D85CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID: DispatcherExceptionUser
                  • String ID:
                  • API String ID: 6842923-0
                  • Opcode ID: c5b86cf86cce70034a5becbecaa4078a99ae65b7627a9266f99786e89ecbfe96
                  • Instruction ID: a38d4c18e624d6e71814b01537b7c8cc95b76e6a5304f3d85624c6d890d28a4b
                  • Opcode Fuzzy Hash: c5b86cf86cce70034a5becbecaa4078a99ae65b7627a9266f99786e89ecbfe96
                  • Instruction Fuzzy Hash: 3AD1B174E01218CFDB54DFA9D994B9DBBB2EF89300F2081AAD809AB355DB355D85CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f59101fc54941d228f68eb6352b215591276caa07269ec0c7bb38001deb60038
                  • Instruction ID: 059ee86a4f9f575f2eeee21309609c2100c6cb2189a6b4317864f591d26d2cd7
                  • Opcode Fuzzy Hash: f59101fc54941d228f68eb6352b215591276caa07269ec0c7bb38001deb60038
                  • Instruction Fuzzy Hash: 5DC1B274E01218CFDB58DFA9D994B9DBBB6EF89300F1080AAD809AB355DB355D85CF10
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3fe2c01ad6d4e92af9984d0b8b57b85d4b009ccb4e2ff5030d7b25cceb4922ce
                  • Instruction ID: 3f91a77be87e10c039b89366eb41d20e172732f2c426575425be03ef58dbf677
                  • Opcode Fuzzy Hash: 3fe2c01ad6d4e92af9984d0b8b57b85d4b009ccb4e2ff5030d7b25cceb4922ce
                  • Instruction Fuzzy Hash: 23A18C74A01229CFDB68DF64D894B99BBB2BF4A301F1085EAD40AA7354DB319EC1CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.513312156.0000000003030000.00000040.00000800.00020000.00000000.sdmp, Offset: 03030000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_3030000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1071b934b536e919063ab0574caa307dad44c941c0a25fe1610e3e4c6b9138c5
                  • Instruction ID: e760775a4636ddf549889f0fafd508c1b8ff748287f14908b66c4719c4a47f81
                  • Opcode Fuzzy Hash: 1071b934b536e919063ab0574caa307dad44c941c0a25fe1610e3e4c6b9138c5
                  • Instruction Fuzzy Hash: 7E519F74A05229CFCB68DF64D894B99B7B2BF4A301F5045EAD40AA7254CB329EC1CF50
                  Uniqueness

                  Uniqueness Score: -1.00%